dfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(r7, &(0x7f0000000640)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000600)='lmd5sumvboxnet0md5sumself-[%ppp1\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r2, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x2}, 0x0, 0x0, &(0x7f00000000c0)={0x4, 0xd, 0x7fffffff, 0x100000000}, &(0x7f0000000100)=0x88f7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x101}}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="00030e80493f1ec2cec9607e8847c4578ad7026b00210500cd020093dd86dd00008848ba6558301f729422ad6c688342b9c39e80aca4b1d8c40176ec09b4280452fd79867a3f5fa452060d297f9401b4e35eb9e68b9adfd178514a941af96fe540551680107fdf79d1af8f4e5630b0c9733d41cc0ff11999c3c3740f085a2019299d3537fd57bc2b08b1e383bb5dceb0ceaaa1afc4784e47222dbde1e116f7be5480b18cac7747ec5d3d4f46f04c89a32f829f26bc9d4d490925dc5e59927a6e16984432958431f78d46dda648f0e1e18e54e5d4513c65b1b432195f8c561fdb5da872d48beb500908"], 0x7ffff) 17:37:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0xfe}, 0x28) 17:37:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a306feffffff", 0x0, 0x103}, 0x28) 17:37:48 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0xf0ffff}, 0x0) 17:37:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300400022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:48 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x0, 0x7fff, 0x2, 0x8001}, {0x0, 0x6, 0x6, 0xdc}, {0xac81, 0xe3a1, 0x7, 0x3}, {0x87, 0x4, 0x3fffc000000000, 0x7}, {0x7fff, 0x3f, 0x7fe00000000000, 0x821a}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:37:48 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x1000000}, 0x0) 17:37:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a306ffffffff", 0x0, 0x103}, 0x28) 17:37:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x102}, 0x28) [ 530.369231][T23764] device nr0 entered promiscuous mode 17:37:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2365580022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:48 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x2000000}, 0x0) [ 530.426314][T23759] device nr0 entered promiscuous mode 17:37:48 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x3000000}, 0x0) [ 530.931633][T23770] device nr0 entered promiscuous mode 17:37:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a306ffffffff", 0x0, 0x103}, 0x28) 17:37:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x2}, 0x28) 17:37:49 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x4000000}, 0x0) 17:37:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300600022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:49 executing program 5: r0 = socket$kcm(0x29, 0x3, 0x0) sendmsg$sock(r0, &(0x7f0000003a00)={&(0x7f0000000080)=@in={0x2, 0x4e23, @loopback}, 0x80, &(0x7f0000003880)=[{&(0x7f0000000100)="bf291e9925d9772a5a3addc2f985955e7678b174d8a9b8c8e69573", 0x1b}, {&(0x7f0000000580)="b378a705544ebe928522c5af12cf639866251f5ca0e34f6d6abfb5d6568666078c2478bdf8bfb428e8f9b98a3968c5ac02762dbaf3c44f010da0519b3c479d443f68d305dc7bbc83d635de6e3ad6793d36e7de118761e036ebdca3cb387abcd10b7f3bd71de9317625d8183f1db39b52fd210600962296f07752bf941287a15413aec1576a8ac2e7dc8e924614012da04d4e8f399faa428c64903c9ab25d58085bb6ded62fa2b6b971eeb1c873f0aa94d07b0b503d2df585336b77c92a826c95ba541ee8546c2b32ae28048a725dbd1be4258f33d7b394de15d927efc032fb3e058209e169134f4ad40aadd8a79080ccffd50fd5ce96943794ace3507fcb719afa16f4f71a1036d57c0b0500b85d12ccc491c11ae87a932365a373ca988c9e0e16ffff0dd8e89fedee75687e787657bbcc26654cc9a0e4ae365aada6e762a6a68d0c06b7ab9d1f5f303743b23bfc4035896804346a618e6e14c896d6f87b454b2491202e0efb662ed3aef925613de8b68cde598c136b6938fccd7912518a42002ebb1eb271f2a9807bbeae59ae3c25d78c10057d56e161edf08d71160271d0de6ef8f03efd18f88aae924d1d7cc854175ddc676a82a7eaa216af3ef8b9bf794dc4531b320cda7b3f8f5947d523bcfcdbac5398507ed89e23bff506aad2633f9fa9390a64851418459348f2867c1751d79baef4dd6d54635953fac8e7a608cb03cc9308f028b6686aba4df9b8fe27c6ef8f4b0ae5a0657a76aa931a2175f528dec06a972b06c97c36ed24266271e55c4d5cde28ea5d57b85e2111bf85a953831ad78b5083e6ee7a5cd890948b68e1e73c050485b72b8447d72817ccb77b905df3ad316e598228f41390d978a8a65b14ac7144edc0125e68d0ee898450acc74475db059c524bc7935231b557b27b163644765b761177c1f3b621cc59eba04b80643f5f15e2f912653723cefcacec7baf06c54d0a77a0dd4ee366515d8698389a609698b38454b31d0f7a2eee5cac5412776fcb54b155a3cbf3914eee595dc41010896dab03da40c07ab1523b1aab00048ced3872aa0ec8a07cd6cfe2a5e4d520ad8d7984247f230ed54705c33bd7509d9c7fd8e3451d1d3c9cd63217233b6abd8144ad345f52cb98289eaf1e8d7f32110c034f9e6edf9ba8920f1414e7956d2462cf65c091feaca28c68ceea6715291f82f0e6601e1a7a260f08bbe11456da7ce252f9fb9fc8625ac4e32d1885158e5d21856f4b56d3154b59b603a4113544692aac7052c5a8b14c57455708fdc60383119c415266f23076caaddf5b3f1422bdc4507d1221af962024ee657e95e7e0810acc44937f4388817900b9a4f42732c7d397e57c1973060c21915f77bec481ef273ef024c6f0beec1addf3413fe7ee5540328d7ec5a4ff2446b140a79c96829c9c218feb02e53c2eb00823693e8c7cde7385dd7770c206524f0f24ed5f6e38ec7d89f5e407cb6ac5258485fd7dfb519e62ef9b0aef20985dcbf61d073ae0374569d5ddfeb237f0ef581ea459f1f1bed1ba450eb32383f7e13bda029b90fee644bf10c3422de66205f58631b69070e02dec16f8d689d583e4e05c0174df3b1cc90b2e5ddf9b0543d80558fe4f8d7b3d6c1d8b1c9b511f504c397edd6615f79292c509d45baf1d61106d6905dcb151491e5a9cecc438546d8c4e5a426ac420fc5ec2c8d5353ea6f66e483bbb1dfa2544d42f3b3a9d15a8379b115279624a503bdf391785a68e78dcd7fbab16af248608f6cb2ddb42708e83101ecf34a6bc561e33cb9ba89ff58797b545130b2b48e716e6dbfc3771e5154a74517e05cf56ba3b82a4c18f55174e10e9b8a16caa8598089982153c7a39bae87a3f5373e1a9d20ec80e2d434d6093ec8cee1ae47765fff048cfd780e0d9f3f76ba0aa59be05f2f54abef3b7b8c2eb2374b70bbda77f651e93d23895e7c250f5374dfa4a6d8ee10d7dacc4f93ef4a7111fbb127325af49f89e0db862bc31679d6b77b4768bcebf8c496f6d298b7aecc8e25b4e92c4fb831bf4612bc966595cc0ed793c536cf1db71cc0e40fd0bdfb27b7c950a3c56c19f9cdfb0bcc375fda000ba5175544032898366599e8790712bf3915215f68a978fba668baa694b4e40c4331d52b31476280a1a920c7f4135a0044dbdfe2b73bbde13e28348aeca4e8ca7bca4ab92a013296921b31f8fb7b46e96c3740a23faf789820e1a8a3da9c81e5a327b18192b6e06872fd7733a036af7a702573395b2c898274efb9bab09f15fb7333d2ec1810de79b8d695ec382c61521a873c414984b81d068d09c6a287ac83d7383dcf81c15b8529c1dc71c9cb22c161abcd2f8c769e080706c48cfe95f8d04dd16d91aae05e78f6273ebb715f42156f58a1c0d677c8c91478f7d204d0e72ce03bc5ee923c3e2c7da05256df74dbb62b574abf2e4dcd2085ee2071786e062975bd8967e1b91de68a70e0e9c5e7a407905124fc4e1bc70f5a0f1753ad8b0c2772d0f307b0c812a217f6f60061968af50329d222e6466c04664b67fd1b796a22d53a8ff68f094b83cd6aa597eed7045faeff85fc98cc658fd985deebda55fec0aa716ee6c6d4a3368bb269f30cb21a5f555dd92c83db277fd535cb3b5aa92ed08c5d28cd95108e6cbf3eaa43ba1908815fd46485a0a6824ce7789a1d0a9981089732679946a528603752960f282768bb2f615f0867eb41e51d5b2594156579ba6566d2fb4a19978a88e9db0952f7c4b19f2f7fa507fadf62f5f39f3cb9108ec8df7a0e3db125972d7503a4736e23832e7860f79066989e2769a129a0c2f4842f3afb0be1881c6ea4fb522dc460b2ef282526e4cbc2e658a7c766070cacdc518acf1b989db92a149b9650e1b01b5c579a4d37ba2f5778f9c1e82aa39c65f75289dc96ef08f203fd78c55a5b38ab06a111ec25ee4562a8f3097ed936dce7b8e70004c654c9ffb1549be5636e47f2fd0537d5cbd0c7804fc0499f4668fea7f0be5d913a790a63e65bc918f5fdcf4ea4a963bc6c3fe0095301cc84f3c996e8a2d3745b9a9d8e96d33d1468197195885172ed4fe7e49738bf3d4941eff6709baa0d0bd2d0e2e1bf5853c4e2948ec5cab4dfe9efd8902e27d3ac0c6a42a49b9868e347e5621b97b5e67498399befd7692a6299401bbb47c26942adba7eca56fb0ab76a66b6207961c22db7f93622f37bf5b5e5cb082a9868261475abcfdf2c6a59832cf982b89fac115f5ecef611786bfef1c0d360dc6f1581f329048e32e681027947d613165c6b85a577623a71830131bd7de127461d56bf348356f5cbc3a6b13016df659dc00e708f8d7a5fb2fcc49bc0775139c292d5c6b0beaafcc71bd2ff147808d8d3919fa2f1d8408546ca8532f5c187635d5f40cfeac20480e30948a8c78eae4c62cee944d6cf273a8ba86dfcf28273d187265afc5316aa37054beb87121d6eaedebb7bdbe5c90babd2f322a6096269ac0d76cce6d828fabdcfd97ee9956c4708a6354eb6305b3b14866ea4a0fa431c49f7bc3e48335c00d3b8ea60ea2309dbb7a4f1fceac979f0507de28e53b5d6cbb5be9864a3a74b031eda3858e5b02b4cae0364b1ffa0ad6f86c932242f0b125c7937c08a8b7455425e32da98eab7c13ae1ae8d94bcaf683cb901911a1430f1a8cdb37ce509bd1f189beb44778550f868fd08de39b5543fd584ba2c7685d9654db43150b6571846f3816c6fc916169f82f9c77bccfa52571f8cbce2683a9961afb3082b0a9964da02f411acc1e7ccc258767c4f634e48b01c5fb99e1fe9baa3a48c91c577ec4e55a85e07735144fd0758c89b86e7af98488a188ef848e0bef7e93f765f0b4c15750f64aa8ae3e1039a9cd2a6715d18aff12ee87d1e7e285d51c886f8af984072c54ef4ab7f01882545dda9d89e8f7b6cab757269313bd3c762f1b04edda12a340b69f6c1199c9b6f98b7be977df0b86899ef81e4a4fd38df9ff3ecdc2b385e0c1ae00412619b1766f0846800fdb70f13bde12235abf4fb8407dcf63960e6d76a59e6f70ffcabd17e97a7c947154f12b1a6453b9f574a3d7b2c00838571044e2b0fffb4b1148609a2d2e80653dd6205a5e74d1509d85ecae6fa005f58dd0db01366e542733de4e1726f74c60f63b0b000d714847722ee7f55bde9ae83c30e97c1afa5d813504f40009a19325c9035f779c8b56b4acc0f21bc5e311b6b614d986e4345412461f76d68c7c0bcc105f1fd24660a462f3fcdd9a28afdfa31f74147daa47211f1c5b745a70b9e2b55e1e46f1f9a0fcaad096c040aa91754c0239ae29206e27ace54c84df13611c06bcab996e33fb73ce9e3bfa5fdc934c5255454c8e16347bf6b539e92a516a89a221ad178a9472f7662b712855a834a8c244f35fa5b24819a0c968628055fbf71e8265ba0516aba64e99e4051b84a4d5651abb8e65dc4c52f73f84cfa58b7ca03f83770a4fb8a86c8e6d543811c0f4c2fd6ee68d65ae8458fff92b3168c11dbbeecfd99ad28401fe6d39d5215d31b2d2842f46d6dcf29630fd8fea84f77ceaaf27ccd7862c7a724500499e628a55e4e4a8302e75e4e6d4a11db13e225c14f47f897386bafff7ddff2338c9c80cf188ad8e7db9f66c7275a2bf2e1178aabfaf16a4995458a07e7043ba001af71e94b882fe0cdce32b4b7f8074dfe4e690b5361a2dba7d3233b1c1f617307457745da65882f6706df1be2a451c7ddd4c3309aabeb36827cf4ca005bc4cdd98bfbe46dad9149ba6b544de84bcae5744f37cb282d131ab3baa295d096fadb487a5d9af7000e5f99408fbbbb517b7e8629bffa6ff8e4d4425421804d56a9c471211c9a5ca4a63f30857ccfdb9e993a71ecba81a0775d1d9ded8c944c1a7b2bf49e471e6908052fc3d4f4070f472fe37f6ec0bd7ae4643d82172f140464f257133c136b78523073710ba362b75bd5748a93990b9d649227f5189d459b7253fa39dec91fd1aea0d594f87f06d4b04330187e1ee043ee9a3c988ba03debbbc14ed1606d4895a9853d482d0729adcf279bff51b00bf28de4c026c5380b6a2342d35d200ab74c7edd1429404176706d43c36a74ae4f1697369e21542b351638c39185a7774e3e94ede277da57a94c224d8a852f22f78288f3733e297aee4db2e8c4518859d0e27cfd46a5a64cb9785b554f93966b93acc77bc9092033cf72f83b6f3e2c27792f352e49291b4584c7fcc20d5313c62332f6d6b110a93ec3ef5201504d07373dcc2c9b9c539848a115e62701b21c9396cdeaf03b8b74265eb16430be33d1270b0ad1461ff67874f3d933e8eaa41d84db358c4a67e425f73df98042bab81bbf9857bd4b7080db63758b1b61e6ad406aeafb808b9e6f3210cf26cb93e0823e413a1d6c219eaa064ad9a0eb84cff710e83bf3882642b5baf4be5e0dd3c17217f71e5a3d00e7a78503a5558bfe56c572f14a0f4506157fc93fbf467290c06ffb33c6d9ef7f023d882b528f422bb4a90053723fa8de7327f1d24ead87c25f3a07087e8fb279c14170de32e65500e712ba83ad4285589529d8d168c8e9ce6c951adc45f934e6e2cfd83c2663c4b01933f16cc2151a6ba0b62de555e09cbaab895f0833d0c430912c64f7170faa47859f84d25f6aef374f57063e194800c16f7c1fa79aa6cc3a898c0b2fe1a03ce2c6d7e3cb9703efa5987427f8b25a82f86a1bb0a7e18fdbcb7afd60e5d2cc92bac49762ad500fa4dad96e0d6fbf9ff6475674e45ec3e300b05f636349201646af135f52fbbc1e81a9b3a5d92a5f3e9342a7fc1a8c608e23fba75e591dac0a33826", 0x1000}, {&(0x7f0000000140)="39472fc5505f034caaf17a97628358e92c2f8a01a9b0dfed0147f99b2b93e7edb77a5642c179dedc6070e5080fd151658e91bc4d626a03f2b800dd513c1a0ea130afc6472a086897c485629285e171d61c02c2fa971e56b4f51c60cbd28d13369e2ed3fd30836eb1d525f276635b0bb3f9b56f30cd38b1dd721782e174fcabc468accc4476eba975334d9f87e990de965b4dc5835ece5a3bfb664ad5064f5e7a35462129543b9bfcaa2d9eb9c10e30f5cf", 0xb1}, {&(0x7f0000001580)="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", 0x1000}, {&(0x7f0000000280)="8f99ba248ac3b61eb8bed323bf8066d6924516a666358b58436bea14ecc1b0564a3e39086d4044a090d0a0ee3bc1818a8de0dd0ada6890c8bdb5b647d5935b6eb9a09966ec75a5f2f8985b487839a6ad568cd90b258b8c93fba15386002b155446e735327109e6791f9674a3005bc82d1572c838eef712e9a8f7445c9c56485eafdd30a55aed7d36d262b5c6a5cfc745a4cc3ad1b3d50b2253991b854548a9", 0x9f}, {&(0x7f0000002580)="49950a2ee3a3681c1ddf9b6dfef04a13292478d5bdf089654f66ca1a9f8f664fca52e18e69da87aa880d286d6dc6a76d80cd8451f36c35a959d43b446585a6c30b173d4414a920297969f5f7abb5a45f3fd9318c7c55f772e274b2715cc8f4fcf0b42af9d9198f64b9dbaa11097fc7026c91bf7d8f12f2828a966dc55e2b0d93a4358fa39e2c1abdab27192cad90b2a9b5ca3de385f30c5d17b30e9878634325", 0xa0}, {&(0x7f0000002640)="f563925446fbe9f7a52245f111b74d6396ed1acb451d83dbc27359ab7fe3acc5c23e4ebde88b6f9d76d7dde20ab61e17bc8d8549d7c44681e6a2a078b4090903744a3a4686253d1b520c98be0593d90a6ea5209026f82bcc8844546bab7ab8f732083af965c607023d62bb5ee7666e8fd811269501b990f92ed1be7d4647698ed232ed421a25f1097d415b6f3f9a525b3c0efc3e645e67a394125c21632abaf263ce50ba74ddc17e1c583b40840a9dfc5b093de9cd8a6c3cacccc9ffdc62b8f96dd9622118163d81c80b75d1b598ee7fee9d405f39c1d8bcbf5f5b82ad0c9ea270ab127c1adbf7a4242b7fca", 0xec}, {&(0x7f0000002740)="cc05192e4c04ff289a998dfd3feefd6b81b36e7d7c2c89cda55b2489d81fcd67870b1087a9f9d9893f5444b1deab35411019b5a5d99e69dd034298069ec1264ae2501a82b9a7fc77314dcd211c1c12235e5c5c1e56eac6ff0702712f8056bee372943c08f0fdcefad076c0c539586b804eb0609db9ec6e706572359be144b79f4484c503db4cebc7321791a9a29319d878755231bd0aa4baebc15ce730467f3660a0bbdae58777", 0xa7}, {&(0x7f0000002800)="dbf0399fe4f440d972e05ff32a04366bdab7295b34dd8ffd8621ead5fa230a270a14dc8a1915cbe0ff715a06ad26d93b9c16dc2800da8eb65d62c8717ee058205771c49c07797de8c824ebe747ea45298507c9037b90ef96dde0bcd6ef163b09a9d243d61dd6ece0af3a58c66ef51f454f315d7ec72ef7fd0865ef5ea13b3f02231886c9d3f7616124a0eb62d5839b49d30cb44b3df5bfa02ca7276434d7a2616ea69943f7b5ed817c354065ce16a4dede7fcbd1e64f07e34f697b6d9ed4988066b55438c3aad8d526914eece7c69ff2bcb1d6f1a5ce173bca2ce3d76f4a32d8cbe01ac5f17d6282d282ec66bc883d0af574b459b1319406fa9c09815026a18d61d59b3a4f82aaabdb02600ac4921453eb9af5cc78ee62e5f90306571ff68c7bc04563a4142b1097387f87b0dcfc606de368fb43f9a8eddd0694721497a654abf91a5d23928fadc0a4a07ded62875e997cc7b15eee63b58be50689494eea7e5886a76af3bd6df4bee7975599976d329445ea574d731a31f51e9808e232aaa1ec0f4e0dc037c19cd0602a7d069c22044a77f5ce1eb752e6fea184daad3a9142fba556b9c0e9df656ab3a8c2025bd8fbcee138ac32ebc3ba07afc93a408d69b031dc1d6dc83d68027560cb95053b4330bc093ed422a04ab6e95ccf8a2776271ae4a49a5d0c33b6e8cce0a3ca4cb4738dcbdf6aa2410fd4ce7d058b2ae9ddeed60a2c1190c67c0f8df1245087cf81572813bde22b5a1dc216e7b3cc002e049508d41824f2614cc69ec382b2ef75c88569c216a18a1b4458b0d59b13cc73770f14f21685fc151b711e400ec39e17cf8267b1922960dc59f330699b8927f4afa9da398ab56695532f3c286c44fab34d85565910af039ed14c6b7ae0d16d4fbda1953da8227571633ffa3167799fb6090ce63d03ec770e9ac577f933289bfce6f4435cbc3c91d697343bae238c6b219780bac8026e593551d976424a6f7eb11997e2a5a1240fca09d7a46a42078fa835adafff623a9c35f734650bdb4f2a36417a4654d59008a71a01acda8948325faa1170eef058e69a01f25714740807ff2457d5fb7278ae99f6fd554ab245f0f9ff82cdb589f7e3771684f2dd5aa0bd25a419d78ec8111bee05f6973c7802b8e8f5a488c486ef16982f630169ef66895fc0fa5e35a331677c98a6db8258877989fcb4190966cadead47b07718dc1744ee3d700fc9862e63b05e049f0c6cfb94ec86c4fdc5d38082de84b614362b739c1aaada01169f735317cae1e4a3f96782494c1d0e78a6a4656e1a501c00c5d98e365c5eb7df57600f0a9e48861c9ab016fd84458ebf236d9b80394dc020b5add6ba0c16d941706c6217a245985ddaa009161f4b2b2890f87283e43bcdc3024aeac153d799be4e70fad4f69305c6355955c65945c5be49a4afbffa00004d5e63f66df1ed0c1544aa19cf7a665d0abd370b63d82025b7341fab9a5db1050514ec857e62afb3a9d3f7c020df19fa53a9f0a5f969d4d5e1cd9c34bc39bbdff40c03292e0f0f892d5fe4fb494f1730e20dbab23dd34dc63da0467276516623e00d83715777d2bf451af7915bbdd4a29c6963e7c6466684ccacb188817274eb52d86c2a99828f9916eac5e1cea5237a97e91be8649f139d17b82a8f976f7ab780b7c6dbf959600f25fea2ba80e038912ac464f15db8c40f4a09b83c69fdceb221a5c1a4c6a75e7e19758a03efaf76752c65b06024406270e9f0730b33630ec0782f47efc6b8b489d44a0669d5c2de6c343da200f3ce39159caac57f95996e8d38eed0553cbb9ca281fadb7a46f435ae24daca858deeacb60f849edf6ba9f0a9a87a3ce924fabbc5c7dc43e9b571011b470ca395bb2b12af16e4702cb7544524d5a3d327e674af28ab71d5434ebee596693d3f63d44080fd7a86457ffc3ba62ca5eb14bad794a94938b54fdf6974a6b1d626fe7c70da4488493cfe6fa8e0b0b1fd3c27888bdf1df44cdec79f8e7809b1635590551f3d0a541f05005e1132a68c69fd727ba95ffd4940491fa6283e4afc0f08304fd7ae726976f0dc50013158516d4209522fcec88e95786d689b6e9dda1e1d3aae2b8aa4235199f76887a5c3aca19f01ca0bff41790f5d448bd61548b1bae0b1913be4c72c2f78af748426dedf320ecbd85d5285186cfdbacf1ddd208a27e905cdd981495cc6ef965bb494b45564d2b08491a4c8ed267be6b582b1414e84488452087026e356bf4fc7cef03fc51e92f765e892c5d0fd86de44224b5a0b592ef99a802c396d724f21953d4fbf32f5cc33ad54c24d9642249f15f96399b0e9dcf67892f7ba607e5861e93d1a79abc5c3ab7cdf208dee5b40fd1e4fc1da035bede220f260b4ffc1e81384d84957febe677ebf642fc738b4040149ad2963899924b0b04ef7263be986bc96f78f622b0a937988c7aa6eb8846e82380dd5d3f4bad02acf989553953a4601eedb1059efb28b48d331ba23ba0d177bc60dab1f5b95bd88666a1f9c593139eddcfa50cdc86880bbabea9cf4ed2ad2323055bcb809a3960029912261cf21253a24cdeb904130e98ecb74370062d150f2850a2b0ae1ba1433d5c4f414b1de9a861a199071ba7ecb374b0bbcfafa2e5c292489ad5d7402c093eb3321a7627bc20573dd91d893fa298435551dcfba684dc9678973fee30dbf51c09b00785c1ae0040bbfea0d412b25c51b724ebd813cc241165b3f36c1b8695867a8f1d0a4d2cb6cb47394e6b0a62e15c994a1895f71972c6242bedfc03bfeca53ffe52c41bef983fe8553550875aede8745f8405ff13866250a9e4038510810ea620b32b7f582dd2a19bd87d030e259b5aeb6899f7302e68f66e4c1bd4443e068113c0f43c00d758cf8b4388958083832c66868dda251e0151a454dddd099cf925a5d056bdd07233362ad0e254cade92ff859b1f7488e8ed5926ac5ae5f6b98b955195b52fcc9b87a2aced7ab81bcdf3ed4066d240f23255c2f61412b9a305d732fd2e92a72ded1ad4b678c8f83ce98f13db939145f35922251fd1c007cfff75db79e7995aafea87efc3ec862b5be44e36563ed9fd7009586bc01399289af77ce8c983213418b8910079a045453afcf40f96dc2cd2bb10f8fffcd9f3fdfa0c896f6ce0ffbae922c6ab101f1d58d6eab1e154c7b6f655d0f7c621e043ee46c26717e0058beb75222a33f844a06fcfd85ef0af0fa8df7f2a12debf4c1e2be13024b1663b64b888686bfd8bee38024c3024597d874c347c15722b55b3ed2ad09b98729eca352645ee7d8a47d7157704922963cc8168ada5f40300936a1c9f6767c81c44beeec3d497d69e5ec5a783aa73ec97479d36869778fc6264a296d680a22495d715f9f5dfdff20adfc2aaaac56dc470f24bf14fca50f266a0371302583f729149f885b39995a5f0ee13f4ce90acb6c95b7014be59c83b3a906208376e89309d77915cc395e1aaf162ebbb75dc1fb828a8692606f6bb012bd640f0614e79b0262a0cf3d903125ed20d8619a6963d51eb3c588774978fab5ddafe4fe94df2f471e8ea8954f6a69ce67705f2f64aa8799bf3b829580f9697de37545027055642de1da95cd5863a714c1d1a46811d4dc97ed9fc327e2b4e8c97db87f1e7fee17022bc41a32bccac0dc760b64b3808c90ff7f694b948bca83f277e5b6c260803385a26f7f0b0db88a59ee9106d2ab4f2c2b384eeb62ee24d8e44ea7aa9fbc1b0f4f0583bc9376df04887b5ed38276a13ce8b2c64e01f03e121a66fbd9fa447be836a515909d1c1fd971d37829bddd0eb2f083c596d1eac76feccad4909eb781c32185f009fd149e17ae8281b2a1405627680f459d25ef5fbb4a10585956e8bb342b5574b0053e4119fc7a49f392d4add8d8bb9bb42f73225476ea3dd8dd9a61c18dbd2d5a3375f1f7f6f4a6129abcd9c294ab0c2e8096e5f025d0a002e8dfdc781331f14fc42109097018e7c999b23f955d9ba4a8c07e68f3a6e261118408da6ad265fc9a72b90f1f9aca6e8d0d8c2a0d2c4ea6337f90cc4722fa7a4a481fa7fd0fffd72802e7ad6ec376c1ebb2c0e5703e769dfc77feafe5754db074c5e6ae9b428eee9a73e875e4b1a23128ce63be60a62879460455cd02bae3ba30818c2f2865d55618b260d817b697d7534a44671225ffbba06afd5c50e3a775411f335a90773c72b1d41a673055d9244cca45f64b379a59587375a3653df8acee1bac62a085d96ee4fb22ef7f68473a0305adc402444f1488acab4e678300eb791815ccd7ec7744f7eec9cd8262582a8ac1e765ce5645be793fd0f9a5a0fd142a89834fe29a0dc1d868deb19407548c5860a9da5e0399c452bf2fd21cc6d427eede804d41f7fe6ae138f1a455147e43fb7be8def81e97ee73e3eab4c5fd49af6d22ecbb722bbbf73c83eaf99bae925aaaaef3a740bd4b826ca8fb502b5138bbc45b07241351190c6a55dba5c3a647f2188699c24688e151167c28d13e6269224fa7bd7ac18c6b42ac03ce15aa78c5476eb10d1d2ea7cf20eba37de4ca8f9b4e9ab3ca78ecb5947fc7ae2287b53f74ae48ec6f5f85c9c527d4a0f8f24b7efd83c308e5554650bb57edcf52792be19ccb2e65bce84b524b2770d53a3509e5632135488195faa85adfb2a4cc84bf3bfc29a95727c8bd5ab20e15e1b638ba4c36e9c84243ab8653464fbc8ddee7a72722b0b66adfabb7f2dfabe7c7c79afba55fade3401bde06b47849ca910048ce960fc7bac28b5926fd93b39a545b461a4051572195dca96cb54cf221e9d5e2aab9a35c4929fbaf501e37e978d268da1f6b4e94438a8a6bba72af9a468eb204c043380254769a9d82aef5c1cce9bdce4ca608597620600495ab857bc3d08c476c09d0f72fdcd2caa710329ec23ccf1537a4f30f908d590b2c2e7ff723d251eba7415087005a993ab6635291f6c65d07fc03efe9742e9b0aa113b85f9abd16dda3eeb0255227c746fc6eca015b429c55330f9bcd4dbb94e54e21a864dad1ad52eba1bcb66b79af94bbf964fa4aaf011d6767b13d49dcb1b73ff9cc63e22f49e68d937183b30e388fe321ac9fc2323143259fd311cb62cd7f309161c3a709b6460343df63b390041e2255c900f675df68cccf8289e0d08f62459e428ba26322dea8736adb1809fbaaffb174c532f1e27b83a8cdcee5cd79de495edf0f515783fde173f8a7f4ec65e96f5437015a7560cecb956b26e0d5c4dc958119d7fabe8d12e3cbea03d45eff59222d9af85fae845144b6b83e191c9745f662076f22ac356bc4caff9ebe84359ac978b0eca01f237c3de0fd14e3087fac8cd06fbde6d26b21ae44f5076f0ef1e1938365cedcc28f553f0d11ffcd0fa188d267b176042a5846cdf957097e5bd8c38c1e41930857b578e187ef576a36f19c4a4f792ba96c36b75cdc16fa2ab83c36810520a103db2294658b16358c99647ee09e79996e15ab5d24c16b0276884b19d17cb8d199e13ec02c676415ab3526ffc67d357ba5c3fa9fa3c8f92be007984cbdf8ac576c589cdc2adf5c331d5cb482fe4500315310d989a2a5588339c47930d02809c6d719f17fa24121dbe70fcb6b9de79e01935abe2e65da5c26e96c2eeada2934b32c5604a85334220b99b1076b0e6f1fbce235912f0ae812026715cbe8632d4c7f418b8755d7135e422848f0ef0c7913f67a5323e4c076e3518b7ea6015b82923ca7a4a0b8c7b69d6c28cf12878d18ff299f680afb5e100440db9fda4898050674b3d43f90ebc109e897d86705f20b16656659435db9310ff0b10471a8ff9de16ff10673", 0x1000}, {&(0x7f0000003800)="c58a29c5c3de4a3965bb5e19b8c68315b1695c53e060edaaa0d4dc0a6bdf6dc08eb8bd0b6d9a3a7ae093a346332a61e91dd08e5ac9e1f82a777f2aa7e061065506420892bfd8458a5b8e87", 0x4b}], 0xa, &(0x7f0000003940)=[@mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x1ff}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x100000001}}], 0x90}, 0x40) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)=0x6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:37:49 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={'\xe4\x00', 0x100}) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0x8c, 0x87, &(0x7f00000000c0)="aaca9ba38a7dc6c61a0cc775ec04b0c64ef7b7887928ba13d3a9efc2f41d5e566928be39080cb718a92be3ff0dbfc139576a3a9f2e1e9f70fbdab6ddd0a4701aace669fa102c73449185b4c5081b7e9958c4de5af13fa6176a6dac52e736fa802945f6796dc34020d344672ab130209f9d5b045ff230aeb1ebed2f3015f5ed02931dc33c603716b1cbb8da12", &(0x7f0000000280)=""/135, 0x20000000000}, 0x28) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x0, 'io'}]}, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="00030e80493f1ec2cec9607e8864c4578ad7026b00210500cd020093dd86dd00008848ba6558301f729422ad6c688342b9c39e80aca4b1d8c40176ec09b4280452a592049b34bc7626060d297f9401b4e35eb9e68b9adfd178514a941af96fe540551680107fdf79d1af8f4e56309ac9733d41cc0ff11999c3c3740f085a20"], 0x7ffff) 17:37:49 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x5000000}, 0x0) 17:37:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a306ffffffff", 0x0, 0x103}, 0x28) 17:37:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x5}, 0x28) [ 531.305814][T23810] device nr0 entered promiscuous mode 17:37:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2358650022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:49 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x6000000}, 0x0) 17:37:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:37:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x60}, 0x28) 17:37:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300810022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:50 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x7000000}, 0x0) 17:37:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0xf0}, 0x28) 17:37:50 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2e, 'io'}, {0x5a, 'cpu'}, {0x0, 'cpu'}, {0x2d, 'memory'}]}, 0x16) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x523002, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f00000000c0)) write$cgroup_subtree(r0, &(0x7f0000000200), 0x0) 17:37:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:37:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x1a0}, 0x28) 17:37:50 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0xa000000}, 0x0) 17:37:50 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="00030e80493f1ec2cec9607e8864c4578ad7026b00210500cd020093dd86dd00008848ba6558301f729422ad6c688342b9c39e80aca4b1d8c40176ec09b4280452fd79867a3f5fa452060d297f9401b4e35eb9e68b9adfd178514a941af96fe540551680107fdf79d1af8f4e56309ac9733d41cc0ff11999c3c3740f085a200626ee51aaedb08ca3f6433d1e059bb547c4b9e70e4300889ab4a71668e2fe72d58eec8bfe70ecad0522b2d93d5c3bffef85d5b609"], 0x7ffff) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000040)) 17:37:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2303bd0022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:50 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0xe000000}, 0x0) 17:37:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:37:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x500}, 0x28) [ 532.284760][T23876] device nr0 entered promiscuous mode 17:37:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="230ec00022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:50 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0xf000000}, 0x0) 17:37:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x4000}, 0x28) [ 532.839550][T23882] device nr0 entered promiscuous mode [ 532.951363][T23913] device nr0 entered promiscuous mode [ 533.095598][T23882] device nr0 entered promiscuous mode 17:37:51 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000140)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="00030e80493f1ec2cec9607e8847c4578ad7026b00210500cd020093dd86dd00008848ba6558301f729422ad6c688342b9c39e80aca4b1d8c4fd75ec09b4280452fd79867a3f5fa452060d297f9401b4e35eb9e68b9adfd178514a5e3d3d1d4f30fb44c840de662bbf14b25140ffff00001431941af96fe540551680107fdf"], 0x7f) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000280)="5b9d38e0a94a75f586376962e722fc22800d6f3208225410fbe79b007164be695a5e91325c8387cb3c55e121ed6ffc943d71c7357ed22f3ef9349280fccc3d07de0fc4a6ec71cb3a7ba3cdb005f85e44ba6225e795f96bacc78dd2a9070678d6445830bf60a9caaeb9d26b602431cd7686256f8d065344e3d1aaf688b4184804ce", 0x81}, {&(0x7f0000000580)="d868c2774c464d325979b1591df2638ab4a523209568f75dafd129d302d33491ef9e7312e2a3a833d869c3fd52261dc066c9f2b37fb84b124f8eab4e2d72e891142a97b6fec1db4627601074a3b510453326f1938993b4b1c4deb26c9c968d39af4f47557d5fb8c79f670337fb4b186788542f161382ded69645db601cef4395327f052f4a58591e6be98dbaeb05ad325b8a0e1cfbc78bec2bf3933e546d603450f68bd924299219f6d7e60694037d57d7a4c0f9509e252a2a451c970ab8bc3b5148ab3ccbb79b043a3df5380658cab91099fe64be9592c3464590eab9f64d8486045fa01b20ec5d2213c7e6ab", 0xed}, {&(0x7f0000000680)="f32e720b9680e26e514d4687c70b30725aed09235c13cfefd322bb6e38b0d6ef3697487f0dc161724d7347ad26ee3b44d50c9ecf617820786facb4babff0760bc399d192f6926bda39af6b5ac334378b22fb1c724ec5e27a8fd7978725f83d90670c4d9d87f1a8eaf0e52a28c088ef57a7d22c774f56f24421ed50b45a807bcb5adc3315f3613e3e52783c9b8a08e043bce39616a684f2a7ce33c937038bad278a270101da002d442269142b44fff2", 0xaf}], 0x3}, 0x80) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x38}, 0x3ee) 17:37:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'yam0\x00', 0x4000}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:37:51 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x20000000}, 0x0) 17:37:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:37:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300f00022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x6000}, 0x28) 17:37:51 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x3f000000}, 0x0) 17:37:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:37:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0xf000}, 0x28) [ 533.413277][T23930] device nr0 entered promiscuous mode 17:37:51 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x40000000}, 0x0) 17:37:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="230000006b008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 533.981478][T23933] device nr0 entered promiscuous mode [ 534.109180][T23941] device nr0 entered promiscuous mode 17:37:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') r2 = socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000300)={0x4000000000000001}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000ac0)=r4, 0x9f04a2fec361839c) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x7ffff) 17:37:52 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x48000000}, 0x0) 17:37:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x8000a0}, 0x28) 17:37:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:37:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300020022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:52 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:37:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x8001a0}, 0x28) 17:37:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a306000001a0", 0x0, 0x103}, 0x28) 17:37:52 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x4c000000}, 0x0) 17:37:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300030022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0xf0ffff}, 0x28) [ 534.512528][T23985] device nr0 entered promiscuous mode 17:37:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000f80)='cgroup.procs\x00', 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000f00)={&(0x7f0000000940)=@pptp={0x18, 0x2, {0x2, @local}}, 0x80, &(0x7f0000000e40)=[{&(0x7f00000009c0)="90b8c7c47f1dab153550f6d5972a6f5cd96c133c121ec00fe9746f77cb4bf4b3ed98b4504ed1a29fcb49311d3b4b3b7e9bbff74fd46afc0381407f7a83658571befe91664eaa5deee655c6a3dc870b53c86c5248e80314e13c33dd6ec45cfbe72361f5eb3648fd7bcca06378fb57706f3c8aacedf1923ed31236354573518341f38e73e053cca55045cc3f95", 0x8c}, {&(0x7f0000000a80)="6a4a6ae4ba7fe379e7eeac5d5348316afbbffde2e4fd0dbca685fb275d643a1a6b051bb3c434ad", 0x27}, {&(0x7f0000000ac0)="030b488167c0cfdffa5d2e689b3296115fa7aaa1b8df1995", 0x18}, {&(0x7f0000000b00)="f374e31a7d84b466b65276d44253096f9d9cab4af7b79bb4dfc09a949849ee924e683c3477025b2863aae8eb49db26f265cad0dc662bff287b19f940c7908d7ec0a9f6756cba6975e2c3457b520ccbade9c30d3fe1a9fd83349ca2f75d72348fdfcef7939d7e1f89414bff5b42c841943439ccad02906b129dce84d13860dd4d3c494ef72f3e6a59d9fbd4350aff21e463b4cf4dc6d90c398179d2137a16ff83298bad3efee6bea13985c4f2c3efb9ec4c6cc49dc895e7381277c813e05edcb11c2b91e478e23ce29a", 0xc9}, {&(0x7f0000000c00)="fe09f7865fdfae12fdcfa320325a959d7dd2c3978c0083e3b57ff11dfa694b988890737799ab563e4f8c2ee16ecbe560d32597df9f05fc0acd6e232038e7e3df594abbc4c0ebc4da75f13007f8ae6ae26823a866a9a2447052ca6adb64ecf2b9e4502418572f7d4c78c78ccf797c72422bb5b05b5dd3c572a1b310a73bf8e2ce6a96c5190ed33b3983a18cb644d396065cd923642cab1ac1a718e51ef2017bbbcf15a3e0b31ac10b24b8870f124df99bd69adc95ae68", 0xb6}, {&(0x7f0000000cc0)="8ee87983085b158900245d6be75f8348261402834957aea11d3b330223c4b8c13550d885752cbfac2f674e54cc2a79873003faec74045fb1ba3e8d56486f46de470f6a9d98e9861271c52b5c7a1978393e851869a52c30235151e08974c0ea46db3e677d2d42b9fe72bdfae08a7c508318f8ed746ad98823357e640ad8", 0x7d}, {&(0x7f0000000d40)="85d1a232f20cd9ef4606ebac455542d70c041e9160522e4a3e053ba839d3b387d344783863a929df4b07a5746548c96b7928ce167f57f8d5971558c62c859650840f0d373a4c523c89e418f79069d6d2485db25f1a1177d5b060b88ef1edb8bd37084209baa7d8596549c101d8f6127842ccc5df8d", 0x75}, {&(0x7f0000000dc0)="bea8f249ef", 0x5}, {&(0x7f0000000e00)="7fe1ebbafb394276fc8d42607f44", 0xe}], 0x9}, 0x40000) r3 = socket$kcm(0x29, 0xee64afceb0a6cbe8, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) openat$cgroup_subtree(r4, &(0x7f0000000f40)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000900)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @random="736a0cef44dc", 'syzkaller1\x00'}}, 0x80, &(0x7f0000000700)=[{&(0x7f00000000c0)="adc1feb05dae1c2f8aa91f0815945eedb05a16da7ef1f137f7b944bf31bebc4b4776602dd4a61b67ff5c202763ffaa8d70346876cbdf150ff264d95e09", 0x3d}, {&(0x7f0000000100)="31424ac954b80b16a8dfb399efb522cfc8b1b2484e4597a43d38a1c082256c9abedadce66fcf5d3eb542ebafd69f647c8542777115d5e8e25cc14411bbe77dae4297d536a1e604fd033d95672e12aa89635682d593e7790fca27683e1d25a14cb3a7d72fdf5d9c2e6918e7f1a0ee70dbfdf25a23e4519c3b517b44d33c2ddb34cca19e25c7c0e27c7afb12248bce706247f7851481700e1f", 0x98}, {&(0x7f0000000280)="da94084c1ce641ceeec91d7705e9a6bcedcd27f7b150c3fc219443eb2c899e277e6c0ff505dcc41e3b51b1a32c1473b216ad24a0b041012edef783155d58c132302245253581318009f871f033c3a283e063bc3c8312618227a2c1aacb2d4e54d8afdd2764a043dd5838bffd73655c8c9898126e6fb1db6e2ec96178cc4fff4aed391ed3c23fc48c69261eea08bee91e0abb9351dfdf4f6091ab77ebdcd70e07ca0ac7de0b94f0b024", 0xa9}, {&(0x7f00000001c0)="e26386073b8a29aabdcf16db", 0xc}, {&(0x7f0000000580)="17249da0999ac72042583a4f44b205a9dd66115e452c7a7e5db7fe7f60b142583623fd5da22bbf615b97cca047d09cc1de7086a2eb7768f99cc3e0133b182cedaf332768ab9ec88111ad804c933a5b462af6", 0x52}, {&(0x7f0000000600)="327549af6285c93f41c3570a02045a936af3efd9d0efacfffc111a", 0x1b}, {&(0x7f0000000640)="43f9a8c0aa06c0a8ba18d668431f8dc1b0670c4bd32b648dec57c0208c8b03a8c554771aae8587c0dd0fa8cb8fb7e9ba889596544a", 0x35}, {&(0x7f0000000680)="b82a475388bc8920f24aecbdcc6fcfd217bf50c245af41501b13567ed1501c31af8bccdce59002766f076082970b841c569f0b5a1856e1c103a94fc978df98563f7c3437c6dfea38f8356ac9b4554e3ffc67", 0x52}], 0x8, &(0x7f0000000780)=[{0x30, 0x0, 0x80000000, "e030f56c69bf04503a894fe9f00b0aec9892f89c4e1a9eb21fc7"}, {0xb0, 0x114, 0x3, "96eb66e80d78cb24dde1d944115ca684a33b31cbb3a75ee6a7df5ab64adcff30ebb371bccfdab0730a750403212722d456f41e96f539581695630a5cf81e9f6086731beb4b335964cad7c349d0e34eae556a1d7a1735d69cdfd26146e0e0974ac09a89d4d5f2dabc36725c1201d9302fabfe1e52a0e98066ca6bc88fccd9c64294a190777562be4bfc669e4fd9bf8b3fb446284871b6fbb3d24c93f0521002"}, {0x98, 0x105, 0x1, "911e5f8d834ff142e9c4a8a02aa5a8cc8db69c5f977c4b4b198345e40c0b05fcf1fad8661ff5e2920c388cd1e547f119f5911c54a03b014d725ad4d57d230cb272b76f48a9916d38b8bf4f3e73a723ab2fcf9756beb0e2a40d03bdbdda5ba4c6f86bf26b11476c7b6efa6db21740a92f71d28a68d459b26706c238063ed009a477f5"}], 0x178}, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) [ 534.920611][T24013] device nr0 entered promiscuous mode [ 535.066166][T23985] device nr0 entered promiscuous mode [ 535.187436][T24013] device nr0 entered promiscuous mode 17:37:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000080)={'vcan0\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r2 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = gettid() perf_event_open(&(0x7f0000003c80)={0x4, 0x70, 0x800, 0x227, 0x80000001, 0x1ff, 0x0, 0x45, 0x10000, 0x8, 0xffffffffffffffff, 0xffffffffffffff01, 0x8001, 0x80000000, 0x1c5a088e, 0x10000, 0xffffffffffff4c43, 0xda, 0x15f67a9e, 0x47, 0x10000, 0x513dbbe7, 0x1f, 0x20, 0x2, 0x6, 0x5, 0x4323, 0x7, 0x3fff800000, 0x10001, 0x0, 0x255679dd, 0x8bf2, 0x5, 0xf37c, 0x3, 0x400, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000980), 0xa}, 0x4000, 0x15b, 0x800, 0x3, 0xffffffffffffffc0, 0x9, 0xa8}, r3, 0x5, r2, 0x9) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) r5 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x28b78df8, 0x401, 0x4, 0x9, 0x0, 0x10000, 0x400, 0xc, 0x2, 0x100000000, 0x100000001, 0x1f, 0xfffffffffffffff8, 0x7ff, 0x2, 0x123, 0x1, 0x7, 0xe310, 0x80000001, 0x20, 0x8000, 0x2, 0x0, 0xa14, 0x6, 0x6, 0x3, 0xfff, 0x6, 0x4, 0x1, 0x81, 0x6, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x5, 0x1}, 0x1204c, 0x1b, 0x1, 0x9, 0x6, 0x8, 0x3}, 0x0, 0x7, r4, 0x8) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x1, 0x101, 0xfffffffffffffffa, 0x0, 0x0, 0x7, 0x20, 0x2, 0x4, 0x1, 0x10001, 0x6, 0x9c, 0x1, 0x6, 0x40, 0xe697, 0x7f, 0x1000, 0xff, 0xffffffffffffffe0, 0x6, 0x7fffffff, 0x1, 0xfffffffffffffbff, 0x9, 0x36b, 0x3, 0x616, 0x5, 0x7, 0x5, 0x7, 0xeb0c, 0xf58, 0x3, 0x0, 0x5, 0x7, @perf_bp={&(0x7f00000000c0), 0x4}, 0x4000, 0x7, 0x1, 0x0, 0x6, 0x400, 0x8}, r3, 0x6, r5, 0x3) r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:37:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300040022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:53 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x60000000}, 0x0) 17:37:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x1000000}, 0x28) 17:37:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a306008001a0", 0x0, 0x103}, 0x28) 17:37:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000040)='eth1eth1\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:37:53 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x68000000}, 0x0) 17:37:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600f0ffff", 0x0, 0x103}, 0x28) 17:37:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x2000000}, 0x28) [ 535.553911][T24040] device nr0 entered promiscuous mode 17:37:54 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x6c000000}, 0x0) [ 535.619044][T24038] device nr0 entered promiscuous mode 17:37:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x5000000}, 0x28) 17:37:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600020000", 0x0, 0x103}, 0x28) [ 536.208559][T24044] device nr0 entered promiscuous mode 17:37:54 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) r3 = openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x2d, 'memory'}, {0x7d, 'pids'}, {0x2b, 'cpu'}, {0x2b, 'io'}]}, 0x17) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:37:54 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x74000000}, 0x0) 17:37:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x40000000}, 0x28) 17:37:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300060022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600050000", 0x0, 0x103}, 0x28) 17:37:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000140)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xce\x06\x00\x00\x00\x00\x00\x00\x00\x15\x00\x00\x00\x00\x00\x00\x007\xf2\xc9\xc6R\x14\x94H\t\xc57\x00\x00\x00\x00'}]}, 0x8a) [ 536.408958][T24080] device nr0 entered promiscuous mode 17:37:54 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x7a000000}, 0x0) 17:37:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x60000000}, 0x28) 17:37:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600600000", 0x0, 0x103}, 0x28) 17:37:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="23000a0022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:55 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x9effffff}, 0x0) 17:37:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600f00000", 0x0, 0x103}, 0x28) [ 537.005653][T24097] device nr0 entered promiscuous mode [ 537.155579][T24090] device nr0 entered promiscuous mode 17:37:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="23000c0022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0xa0008000}, 0x28) 17:37:55 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0xb0000000}, 0x0) 17:37:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600a00100", 0x0, 0x103}, 0x28) 17:37:55 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) sendmsg$kcm(r3, &(0x7f0000001dc0)={&(0x7f0000000580)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000600)="cfec560825b7e70cf8214f37cf3989ba745cd45b41ac86d3763fe8cb4106b006519d7e1ce29569341ab8a596da5d82487e1aa08b503054ad04221db1e46a3fc80473d726d6769a5dcb59e2b5184036", 0x4f}, {&(0x7f0000000680)="b513f45932556bb9af917c33a59b6e0b74ad75c8f2a03219c913116e01b258d81beed6c7e97f6ec51473a0212241b21e07cdc421fbfcef7b877a0f18e853fde3b830d1bc225fb7cb1ab75baba34b4651df4d8f9e54d0ccdac13bcce32ca39cfc6a7296194820d5d6", 0x68}, {&(0x7f00000001c0)="28823b5e1984973e33c44eed9d42ace0a078c1ef9784cf8d8f7f", 0x1a}, {&(0x7f0000000700)="92cd4f8098c4d3f5098a30fbb51f4019a16d188dc92989b68c48c5a1a1011c2a9fe567302407a2df632fdd00f210c30b0477e8480d50ad34149f12088ade9b4873dc5a0742f2bfc1bee6f191ace6bde543bc1bd25521bf50e1c35fd1f6c60e4f289588db7aa6e8edd4ba388e113f48b2452ebb7eac1ddd3eeeea74fbd6b10f6390c5e84875106cd05f", 0x89}, {&(0x7f00000007c0)="fee2e75168815ef1b3a64537a70c77b7ace0d3c46ed62aa58c253e6de5bc632c6eba6a1b940f6baf032bc4592c36f1b76137b30f419e5d55ad5857995ae9dbd4914f7da2f4d762f002c79c71f3cd533a8d54d03fc7be52d379a3521b86c3cf0840fb1fb67029591d513cdb4773c75078b69f7341b4c788cfbf1117bd35df8a8e52fdb09e15e8bc5c10e20c043c69cb0e201490b685da", 0x96}, {&(0x7f0000000880)="8046e985f7aeb9ba3e7b3071ccae6543b6a27a14c384538a19e560d7c78f3417fd21e0f1e5a1879e643e2bf28f511f926421ac21f04aafa3c7f974d720bdd29d", 0x40}, {&(0x7f00000008c0)="f93e856bd8f66dd70ceed55662ab2d93d77ec68c9383b7ab99bd5551cd7c09334714a25c07ced35f9b5fff7203ea6d412ba1c38c697521cf1ca9880ef80544c45489a1e1ebc698795a4834aced0b3fdff836ecb7d973dc87cc7879ab78079e9c7f02ac8b152d9096c459df933401c00dac4e420d2afd092d33700b078b70d2101e689545dbc06e9a52d9", 0x8a}, {&(0x7f0000000980)="d17c6d095d8ab988aec0342a104a7c5f045ae21538e84b74a51bfabcc4df7022bdf4cfee069bacee0ac9cb5670945fa75633ec52cc0720deecef51f151beae03dd7cb05b1c11f7da9014b4828bf430a1a1cf271253f648a278b6280db86808f50795a6b07e7421ddf9edd1f9420feae3665a2a3652ec00cfe3e09ae2f0ae86fb27385ad3bf", 0x85}], 0x8, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"/4866], 0x1300}, 0x0) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/46, 0x2e}, {&(0x7f0000000100)=""/63, 0x3f}], 0x2, &(0x7f0000000280)=""/168, 0xa8}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:37:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001840)={0xffffffffffffffff, 0xc0, &(0x7f0000002c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=0xcb86, 0x0, 0x0, 0x0, &(0x7f0000001740)={0x2, 0x1}, 0x0, 0x0, &(0x7f0000001780)={0x3, 0x5, 0x5, 0x1}, &(0x7f00000017c0)=0x203, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=0x1}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0x0, 0xffffffffffffffff, 0x0, 0x2c6, &(0x7f0000002cc0)='\'\xbd\xd9\xea\xb8\xc2\x06\xc6\b\xbb\xbd\x06\xbc\xbc\x9e\xa6uj\x97\xde\xc6{\xee\a=o\xbf\x7f\xecr\xd8\xfe!+\xdee+BJ\x8d\xa3\xbd\x93\xffK\xce\xad\a\x9e\xf4;\xc8v\a\x858g\xfd6\xdar\xc9GVN\xcecMCxSy\x1d\xf8\xd1b\'P\xd5\xf3\x1c=\r0\xe8),E\xb78[\xe0\xf8\xac\xb2\x9b\xdc\xe1x\xd1\xcdkY\x9e\x85E\xb6\v~\x1a+\x13P\xd4-EA\xa1E\xe9rI\x1d\xac\x1d7{\xdc\t\xb3\xce\xa8N\xf6\x820C\x10\x81\xe8E>\x1c\x19\xe5\xa3aO\b\xfe\x1b\xb3\x10\xbe\x13\x9eI{\xc4\r\xb4+,g\xe8\xa7\xa7b0s\xf2\x11\xbc\xa5\x0fW\xde\xd9\bJ%\xdd[\x85B\xd6Lw\x03\x143\xafN\ni\x88\xd5\xda\x01P\xfa^\xe3_\x87/\xff\x9b\r\bF\xdb%\xa1:.!b\x98\xf3\x1a\x04\x96\xf9\xd1\x1e)F\xe7/\xf6\x90\xbad\x83\xd0D\xb1{\x1fB\xca\x00\x85\x1aO\x19\xae\xddY\x98\x1f\xee\x99\x04:\x9c\x0f\xc3j|\xb2\x10]6\xb43\x9b)\xe8 \x15\xc3B\xeb\x00-\xc7\xa3\xa3\xbc_\x8eobI\xca\xf8A\x17\xd7 \x81\x1aY\xe8\xb8\xab', r2}, 0xfffffffffffffff4) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r2, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000240)={r1, r3}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000040)='*:cgroupvboxnet0md5sum[\x00') r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x100003, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') r7 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54ed580fce4c1f5", 0x48}], 0x1}, 0x4) write$cgroup_subtree(r5, &(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRES64=r7, @ANYRESHEX=0x0]], 0x8) 17:37:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0xa0010000}, 0x28) 17:37:55 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0xf0ffffff}, 0x0) [ 537.430430][T24134] device nr0 entered promiscuous mode 17:37:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000500", 0x0, 0x103}, 0x28) 17:37:56 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0xfffff000}, 0x0) 17:37:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="23000e0022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0xa0018000}, 0x28) 17:37:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600003f00", 0x0, 0x103}, 0x28) 17:37:56 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0xffffff7f}, 0x0) 17:37:56 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0xffffff9e}, 0x0) 17:37:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0xfeffffff}, 0x28) [ 538.160811][T24141] device nr0 entered promiscuous mode 17:37:56 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) openat$cgroup_int(r2, &(0x7f0000000040)='cpu.weight.nice\x00', 0x2, 0x0) 17:37:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='\x8bcp\xd8L#\x1cqset&-p') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:37:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0xfffff000}, 0x28) 17:37:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="23000f0022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600004000", 0x0, 0x103}, 0x28) 17:37:56 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0xfffffff0}, 0x0) [ 538.417903][T24193] device nr0 entered promiscuous mode 17:37:56 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x3000000000000}, 0x0) 17:37:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0xfffffffe}, 0x28) 17:37:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600006000", 0x0, 0x103}, 0x28) 17:37:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300100022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x40030000000000}, 0x0) 17:37:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0xf0ffffffffffff}, 0x0) [ 539.170559][T24193] device nr0 entered promiscuous mode 17:37:57 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="00030e80493f1ec2cec9607e8864c4578ad7026b00210500cd020093dd86dd00008851ba6558301f72942284604766a8aa002580aca4b1d8c40176ec09b4280452fd79867a3f5fa452060d297f9401b5e35eb9e68b9adf551680107fdf79d1af8f4e56309ac9733d41cc0ff11999c3c3740f085a2000"/127], 0x7ffff) 17:37:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:37:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x1a0ffffffff}, 0x28) 17:37:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a3060000f000", 0x0, 0x103}, 0x28) 17:37:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300600022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x100000000000000}, 0x0) [ 539.371443][T24245] device nr0 entered promiscuous mode 17:37:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x200000000000000}, 0x0) 17:37:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x8000a0ffffffff}, 0x28) 17:37:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600a00180", 0x0, 0x103}, 0x28) 17:37:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300f00022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x300000000000000}, 0x0) 17:37:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x8001a0ffffffff}, 0x28) [ 539.977793][T24263] device nr0 entered promiscuous mode [ 540.122368][T24245] device nr0 entered promiscuous mode 17:37:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2d, 'io'}, {0x0, 'io'}, {0x6, 'io'}, {0xf27bbbdd67e261d, 'rdma'}, {0x2d, 'memory'}, {0x2b, 'io'}, {0x2d, 'rdma'}, {0x3b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'memory'}]}, 0x3a) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') socket$kcm(0x29, 0x695c90e3f5d151d0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:37:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600fffff0", 0x0, 0x103}, 0x28) 17:37:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x400000000000000}, 0x0) 17:37:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0xf0ffffffffffff}, 0x28) 17:37:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000322008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) socket$kcm(0x29, 0x5, 0x0) socketpair(0x11, 0xa, 0xdd6, &(0x7f0000000380)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = gettid() perf_event_open(&(0x7f0000003c80)={0x4, 0x70, 0x800, 0x227, 0x80000001, 0x1ff, 0x0, 0x45, 0x10000, 0x8, 0xffffffffffffffff, 0xffffffffffffff01, 0x8001, 0x80000000, 0x1c5a088e, 0x10000, 0xffffffffffff4c43, 0xda, 0x15f67a9e, 0x47, 0x10000, 0x513dbbe7, 0x1f, 0x20, 0x2, 0x6, 0x5, 0x4323, 0x7, 0x3fff800000, 0x10001, 0x0, 0x255679dd, 0x8bf2, 0x5, 0xf37c, 0x3, 0x400, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000980), 0xa}, 0x4000, 0x15b, 0x800, 0x3, 0xffffffffffffffc0, 0x9, 0xa8}, r3, 0x5, r2, 0x9) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x100000001, 0x3, 0x5, 0x5, 0x0, 0x8, 0x42, 0x6, 0xa3, 0x19230399, 0x9, 0x4, 0xfffffffffffffffb, 0x3, 0x1, 0x4, 0xb8, 0xffffffff80000000, 0x9, 0x2, 0x5, 0x7, 0x7ff, 0x3, 0x7, 0xee7, 0x9000, 0x6ea6, 0xa4, 0x3fc0000000000, 0xebcb, 0x7fff, 0x620, 0xffffffffffffff00, 0xfff, 0x13cc, 0x0, 0x10001, 0x4, @perf_bp={&(0x7f0000000440), 0x465951122f76d35c}, 0x2000, 0xe, 0x7f, 0x0, 0x1, 0x8, 0x8f}, r3, 0xb, r4, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000000)) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x3, 0x7, 0x8, 0x7, 0x0, 0x728e, 0x542ff570f30f0e36, 0xc114260c338d79ca, 0x1a80000, 0x6, 0x6, 0x100000001, 0x200, 0x8, 0x4, 0xd33, 0xffffffffffffffff, 0x1000, 0x2, 0x80000000, 0x7, 0x8001, 0x400, 0x100000000, 0x0, 0x4, 0x1ff, 0x1, 0x1ff, 0x4, 0xffffffffffffac58, 0x9, 0x8e3, 0xe8, 0x1, 0x40, 0x0, 0x89, 0x2, @perf_config_ext={0x930, 0x100000000}, 0x26008, 0xffffffff80000000, 0x1, 0x0, 0x100000000, 0x8, 0x6}, 0xffffffffffffffff, 0xe, r6, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) r7 = perf_event_open$cgroup(&(0x7f0000000180)={0x2, 0x70, 0x20, 0x2, 0x7ff, 0xfffffffffffeffff, 0x0, 0x1, 0x84000, 0x0, 0x7, 0x7, 0x4, 0x3, 0x8, 0x5, 0x125, 0x0, 0x3, 0x4d, 0x1, 0x46774ca9, 0x0, 0x5, 0x5d, 0x914, 0xe6000000, 0x401, 0x8, 0x6, 0x3f, 0x8, 0xffffffffffffffc5, 0x5, 0x8001, 0x6, 0x7, 0x4, 0x0, 0x4000000, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x20000, 0x2, 0x2, 0x6, 0x0, 0x4, 0x6}, 0xffffffffffffffff, 0xe, r5, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000580)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') 17:37:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x500000000000000}, 0x0) 17:37:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:37:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x100000000000000}, 0x28) 17:37:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:37:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300bd0322008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:37:59 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x600000000000000}, 0x0) 17:37:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x200000000000000}, 0x28) [ 540.725885][T24330] device nr0 entered promiscuous mode 17:37:59 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[], 0x0) 17:37:59 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x700000000000000}, 0x0) 17:37:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000622008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:37:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x500000000000000}, 0x28) 17:37:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:37:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x4000000000000000}, 0x28) 17:37:59 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0xa00000000000000}, 0x0) [ 541.428736][T24350] device nr0 entered promiscuous mode [ 541.557884][T24348] device nr0 entered promiscuous mode 17:38:00 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000a22008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0x6000000000000000}, 0x28) 17:38:00 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0xe00000000000000}, 0x0) 17:38:00 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x8001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x10001, 0x7, 0xf20, 0x7, 0x0, 0x31, 0x41082, 0x8, 0x4, 0x1f, 0x326a, 0x6, 0x4, 0xffffffffffffffff, 0x8, 0x7ff, 0x2, 0x3, 0x5, 0x80000001, 0x0, 0x5, 0x8, 0x8, 0x30000000000, 0x7, 0x5, 0x7, 0x8, 0x9, 0xebed, 0xb4ce, 0xfffffffffffffffd, 0xb1, 0x3d4, 0x2, 0x0, 0x2ede, 0x4, @perf_bp={&(0x7f0000000180), 0x5}, 0x401, 0x200, 0x5, 0xb8e08ba88e31dc7b, 0xc, 0xfc4a, 0x6}, r0, 0x0, r1, 0x2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = gettid() perf_event_open(&(0x7f0000003c80)={0x4, 0x70, 0x800, 0x227, 0x80000001, 0x1ff, 0x0, 0x45, 0x10000, 0x8, 0xffffffffffffffff, 0xffffffffffffff01, 0x8001, 0x80000000, 0x1c5a088e, 0x10000, 0xffffffffffff4c43, 0xda, 0x15f67a9e, 0x47, 0x10000, 0x513dbbe7, 0x1f, 0x20, 0x2, 0x6, 0x5, 0x4323, 0x7, 0x3fff800000, 0x10001, 0x0, 0x255679dd, 0x8bf2, 0x5, 0xf37c, 0x3, 0x400, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000980), 0xa}, 0x4000, 0x15b, 0x800, 0x3, 0xffffffffffffffc0, 0x9, 0xa8}, r4, 0x5, r3, 0x9) r5 = perf_event_open(&(0x7f0000000240)={0x5, 0x70, 0xa754, 0xce, 0x0, 0x5, 0x0, 0x9d, 0x10, 0x1, 0x0, 0xb0f, 0x3ff, 0xcb2, 0x5, 0xe, 0x5, 0x9, 0x310e9043, 0x401, 0x6, 0xa7d0, 0x80000000, 0x3, 0x9, 0x1, 0x9, 0x0, 0x1000, 0x0, 0x6, 0x4, 0xeb, 0xffff, 0x30a2, 0x0, 0x9, 0xb7, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x65e73860}, 0x8, 0x80000001, 0x2, 0x7, 0xf74b, 0xffffffff, 0x1000}, r4, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000002c0)='/dev/net/tun\x00') write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="00030e80493f1ec2cec9607e8847c4578ad7026b00210500cd020093dd86dd00008848ba6558301f729422ad6c688342b9c39e80aca4b1d8c40176ec09b4280452fd79867a3f5fa452060d297f9401b4e35eb9e68b9adfd178514a941af96fe540551680107fdf79d1af8f4e56309ac9733d41cc0ff11999c3c3740f085a20595999059b478d2bd576d371a53d853ae8c25f062668a752bff9"], 0x7ffff) 17:38:00 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0xf00000000000000}, 0x0) 17:38:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0xfeffffff00000000}, 0x28) 17:38:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 541.802322][T24393] device nr0 entered promiscuous mode 17:38:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000c22008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:00 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x2000000000000000}, 0x0) 17:38:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0xffffffffa0008000}, 0x28) [ 542.389601][T24403] device nr0 entered promiscuous mode [ 542.464173][T24393] device nr0 entered promiscuous mode 17:38:01 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/^\x7f\xfeM\x00\xf4\xdc\x01\x10\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="00030e80493f1ec2cec9607e8864c4578ad7026b00210500cd020093dd86dd00008848ba6558301f729422ad6c688342b9c39e80aca4b1d8c40176ec09b42804060079867a3f5fa452060d297f9401b4e35eb9e68b9adfd178514a941af96fe540551680107fdf79d1af8fe2c467d72b4dfd45cc0ff11999c3c3740f085a20"], 0x7ffff) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000040)) 17:38:01 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x3f00000000000000}, 0x0) 17:38:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000e22008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0xffffffffa0010000}, 0x28) 17:38:01 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f0000000100)='selinux+!lo-mime_typewlan0\x00'}, 0x30) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) close(r4) r5 = gettid() perf_event_open(&(0x7f0000003c80)={0x4, 0x70, 0x800, 0x227, 0x80000001, 0x1ff, 0x0, 0x45, 0x10000, 0x8, 0xffffffffffffffff, 0xffffffffffffff01, 0x8001, 0x80000000, 0x1c5a088e, 0x10000, 0xffffffffffff4c43, 0xda, 0x15f67a9e, 0x47, 0x10000, 0x513dbbe7, 0x1f, 0x20, 0x2, 0x6, 0x5, 0x4323, 0x7, 0x3fff800000, 0x10001, 0x0, 0x255679dd, 0x8bf2, 0x5, 0xf37c, 0x3, 0x400, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000980), 0xa}, 0x4000, 0x15b, 0x800, 0x3, 0xffffffffffffffc0, 0x9, 0xa8}, r5, 0x5, r3, 0x9) r6 = perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x9, 0x1, 0x8, 0x100, 0x0, 0xf6, 0x40000, 0x0, 0x5, 0x38, 0x3, 0x10000, 0x0, 0x100, 0x2, 0x1b, 0x3f, 0x0, 0x7, 0xe0b, 0xb, 0x6, 0x81, 0xf09, 0x7, 0x6, 0xf4, 0x7fff, 0x7fff, 0x4, 0x401, 0x1, 0x4, 0x1f, 0x9, 0x1d9c3e2c, 0x0, 0x6, 0x8e802938d8664309, @perf_bp={&(0x7f0000000280), 0x1}, 0x80, 0x7, 0x9, 0x6, 0x200, 0x80000000, 0x8}, r5, 0xb, 0xffffffffffffffff, 0x8) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000300)={0x3, 0x8, [@random="0d2c49351f86", @random="13fe86d1fb4e", @random="6ebc8f644eb3", @remote, @dev={[], 0xc}, @remote, @random="5922ee23b817", @broadcast]}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7, 0x5, 0xffff, 0x8, 0x0, 0x9, 0x2000, 0x6, 0x10001, 0x1f, 0xb7d3, 0x42, 0x20, 0x1f, 0x4, 0x39, 0x9, 0x9, 0x6, 0x2, 0xff, 0x10000, 0x1, 0x8, 0x2, 0x1, 0x4, 0x4, 0x200, 0x9, 0xfffffffffffffffe, 0x52, 0x6, 0x4, 0x3f, 0x8001, 0x0, 0xfffffffffffffffb, 0x2, @perf_config_ext={0x3, 0x8}, 0x515, 0xff, 0x4, 0x8, 0x4, 0x515a, 0x8001}, r2, 0xd, r6, 0x10) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) write$cgroup_type(r7, &(0x7f0000000040)='threaded\x00', 0x9) write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000001", 0x0, 0x103}, 0x28) 17:38:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0xffffffffa0018000}, 0x28) 17:38:01 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x4000000000000000}, 0x0) [ 542.863289][T24456] device nr0 entered promiscuous mode 17:38:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300c00e22008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600008001", 0x0, 0x103}, 0x28) 17:38:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103, 0xfffffffffffff000}, 0x28) 17:38:01 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f00000002c0)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) recvmsg$kcm(r2, &(0x7f0000024c40)={&(0x7f0000024900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000024bc0)=[{&(0x7f0000024980)=""/133, 0x85}, {&(0x7f0000024a40)=""/208, 0xd0}, {&(0x7f0000024b40)=""/86, 0x56}], 0x3, &(0x7f0000024c00)=""/54, 0x36}, 0x102) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000024c80)=r3) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r4 = socket$kcm(0x29, 0x5, 0x0) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0xd319cfbd8efc8de4}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={r5, &(0x7f00000000c0)="ae7224fa4bf3e4358b9804ba32362aa4ccd9e3b6000e", &(0x7f0000000100)=""/179}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="00030e80493f1ec2cec9607e8864c4578ad7026b00210500acd4fd93dd86dd00008848ba6558301f729422ad6c688342b9c39e80aca4b1d8c40176ec09b4280452fd79867a3f5fa452060d297f9401b4e35eb9e68b9adfd178514a941a883ab104551680107fdf79d1af8f4e56309ac9733d41cc0ff11999c3c37f0f087a20"], 0x7ffff) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f0000000580)='cpuset.effective_mems\x00', 0x0, 0x0) 17:38:01 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x4800000000000000}, 0x0) 17:38:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x70) 17:38:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000f22008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:01 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x4c00000000000000}, 0x0) [ 543.549645][T24490] device nr0 entered promiscuous mode [ 543.661497][T24456] device nr0 entered promiscuous mode 17:38:02 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x68, &(0x7f0000000080), 0x7a}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x20400) sendmsg$kcm(r2, &(0x7f0000000100)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x7}}, 0x1, 0x3, 0x4, 0x2}}, 0x80, &(0x7f00000000c0)}, 0xe10f99e8e0607698) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x103) 17:38:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600ffffff", 0x0, 0x103}, 0x28) 17:38:02 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x6000000000000000}, 0x0) 17:38:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300004022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:02 executing program 1: socket$kcm(0x29, 0x8, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='/dev/net/tun\x00') write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="00030e80493f1ec2cec9607e8864c4578ad7026b00210500cd020093dd86dd00008848ba6558301f729422ad6c688342b9c39e80aca4b1d8c40176ec09b4280452fd79867a3f5fa452060d297f9401b4e35eb9e68b9adfd178514a941af96fe540551680107fdf79d1af8f4e56309ac9733d41cc0f3771b5a1f11999c3c374"], 0x7ffff) 17:38:02 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x6800000000000000}, 0x0) 17:38:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a3060000f0ff", 0x0, 0x103}, 0x28) 17:38:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x20000128) [ 544.018704][T24526] device nr0 entered promiscuous mode 17:38:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300655822008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:02 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x6c00000000000000}, 0x0) 17:38:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600feffff", 0x0, 0x103}, 0x28) [ 544.608566][T24538] device nr0 entered promiscuous mode [ 544.684177][T24561] device nr0 entered promiscuous mode [ 544.803526][T24528] device nr0 entered promiscuous mode 17:38:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x192) socket$kcm(0x29, 0x6, 0x0) 17:38:03 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="de686f202b63702cd6"], 0x9) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() perf_event_open(&(0x7f0000003c80)={0x4, 0x70, 0x800, 0x227, 0x80000001, 0x1ff, 0x0, 0x45, 0x10000, 0x8, 0x2, 0xffffffffffffff01, 0x8001, 0x80000000, 0x1c5a088e, 0x10000, 0xffffffffffff4c43, 0xda, 0x15f67a9e, 0x47, 0x10000, 0x513dbbe7, 0x1f, 0x20, 0x2, 0x6, 0x5, 0x4323, 0x7, 0x3fff800000, 0x10001, 0x0, 0x255679dd, 0x8bf2, 0x5, 0xf37c, 0x3, 0x20, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000980), 0xa}, 0x4000, 0x15b, 0x800, 0x3, 0xffffffffffffffc0, 0x9, 0xa8}, r2, 0x5, r1, 0x9) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000500)="89f1f53c3eab40734a03aa78b16902e4268a34cd16eab930d32eb740a4fb6eb0de71532cdc1c28445d1e443e326abf59cd294e396158e7de91d9a3c1dd9c5a140decaf3a1f9c817c71a271f26bc35ab593d069bf950b224699e26f914e1e6be622f6e2f08bb6013299fb79553b3ca695809020cf164f71e7abd339d5f8ddf83a11d7086d9788e9dec590c388984587cc2056730a142f071294839f07b48f67a2a98c0768b7518fa8de0386760049999f5fd2", &(0x7f0000000600)="d5f3f664501e41cab9bdbae7b37caa1ffa047dbc26c5e0bee45760cd6c1f234064e240e7ddf91d8dd1c1bec8958b30868937656919c2c29c9cf333374ce950043373f80ebddf399cd0dbee35906e7e40d9c1776746b97030446c2029da6ad448ca2787d50ff49636654cb130cca71897bbd479680ce165c4beadc29fab98fdad869b365c327ba001d09f06c035ca0431dc146745ee561fa2ea575d3f2fdb383d8c25b2bd113f3e3df92909544486256019752922033e9826fe29e894cf2d1648cfa3224f6bdd259260417bd5b7830745180fb83237c9eda9a3e22e31f447192b1d27bbc5f761af3d"}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x800, 0x81, 0x9, 0x8000, 0x0, 0xffff, 0x10000, 0x2, 0x8, 0x10, 0x1ff, 0xfffffffffffffff9, 0x4, 0xff, 0x2f, 0xcba8, 0x8a93, 0x2, 0x7, 0x1, 0x6, 0x160b, 0xfffffffffffff2fb, 0x0, 0x7, 0x10000, 0xa6, 0x7, 0x7, 0x9, 0x4, 0x3, 0x5, 0x9, 0x10001, 0x7, 0x0, 0x9ca, 0x0, @perf_bp={&(0x7f0000000080)}, 0x400, 0x92, 0x51, 0x8, 0xe99f, 0x10001, 0x3}, r2, 0xd, r3, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:03 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x7400000000000000}, 0x0) 17:38:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600ffffff", 0x0, 0x103}, 0x28) 17:38:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300006022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:03 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x7a00000000000000}, 0x0) 17:38:03 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev\xafnet/tun\x00', 0x200, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000580)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000380)='rdma.current\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) recvmsg(r4, &(0x7f0000010e40)={&(0x7f0000010940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000010cc0)=[{&(0x7f00000109c0)=""/136, 0x88}, {&(0x7f0000010a80)=""/72, 0x48}, {&(0x7f0000010b00)=""/147, 0x93}, {&(0x7f0000010bc0)=""/158, 0x9e}, {&(0x7f0000010c80)=""/9, 0x9}], 0x5, &(0x7f0000010d40)=""/238, 0xee}, 0x40) sendmsg$inet(r3, &(0x7f0000010ec0)={&(0x7f0000000040)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000080)="6395649de2ed0ee5eb7970ce65cc24ae0fe6ab54d94e922b9e9c2a7a531d556374f495901a1968bcccc4872d36a2dc35f75aa13e2c7931cb9f185c8ab71f02f54496fa1cf6a3685ebf", 0x49}, {&(0x7f0000000780)="22859d0b76ea52819301aaa8ca40c95fafe8b6f23875f0b53c1f67efa12809ca13ad025dc93d25cd19f260c6760086f3ea18b587c9e264fc55bc89d0f0c63fab0840eb2516858064ad07b508f46a3a6ce9302c0b397b56ecfb7110a3c3de5275890ca27f710e9e3a34864615d9a4520f068810a0311f9da4d2d8f1f8d7d8500952fc01af75962309a3983c987d17764a6d4f6b12c1817b09910a88e1c9c6f655fbaeb49f431186e4e7466559504f166e8dfa4025178662670d61c5662e2bda4b6839afa72e333ab51f5f165450bfc8bf3df5d403a8a61b605e94360ef456b596730067ea7ea2d139e0288442e1a4b1804c0448c2a05d4a8f17a0968a6f73e0cb1d6ead23f91c7dacdd4955f16099cb0b2072e55b3a0e45f612ee272e046f50333ae5158e88c455dd7c936d95e87c205e20772fcf4c36c9f013700fe8561452841c8760a914fae1dfee31311390b4ca73b760ed87bc6a2ff08bba088ede1f9efe04f940e5dc374d7b33f8d8fad6c65c847f4166d0ae606526950219ea63a4d066b7bd748a3e1e49886cdfde0f226c54d7a14e257b6ed730746cca8250c01e09a1f10ffd933eec8ea52979e8ca4f4c4be4381044e3d26f37ee7afd2529826a8b559390922255aa5ff20adb2da014be97c3b246376c26c211137af7c76fdbccc436be512e2feeabec72281b0fadc000d1be6f06b1d674730bd3fe8250794d8f2b3cadd63457223cfa1d2b84b26c298660e6469bb710b85db95f99eb2e416ad16831d74521f542e6631e44a41ac6cb2feaa35090488a821d546ff6e44f3a5970a95700fdac272aed74f669443cae00b29f09a41f7ca53f0e17d782578ff0824e75ecf9556c63710febc3f13563d2cea87f4de6bbec795acced8a9b9be77a23e0906f32819e2f0dd42e7e19f6c88feae997ba7f6d443e6ca21a9e45f6b0ced662175c188c743b01ee3cdd7b21d377bafa8af3d21d1a370f95d98917391daca8a2c2d4f1db90b5f271a96c74c012feced57a91dda331c342f24f31cafcd3057865c8e9c0b4f6ac0249cbb4acb6904586511632862a63f0b16ab47e7cb0fcd874b755cc6c24a6f5e8fa58f31963dba1c964feb836edfc4bdd84a3077ef0ebe09804d1c81ff643e643f213d9bfb0407f003390a526ab49c99c5d46c1b27bb30f1c80c55da4b87bc72d545635977a2731de0bf0f55b49c04c84757d8b9600ceac22e07ebd78514276c1bcbbf421d849ef894d5a965fdfb1a772b706fdb1186467421fdcba32fc49743dafa9691d0830d0f6433fb1e66151eb66d7c441ef29de1ea43d6eb441df1659394e8209d076094082a0d6cebd051330a531dec79884b0b19658f88fec1203f66e5d100d82f034f3720426411658ab3f1657983f6e8dab76a29e3c324f522e70e28b7bbb11a80bf671cc3d6938e52f648333bd377f2f06506490f3074183bda2dc400fddf7647a4c25bf9c8eddb10778651fe9d3f03e8d5e0c54b99149c91051f63d76aee2ab91ff9e30c8840f566369a855068dd0861f1b4cc5694ff754db387488cf6eddc228730fed3e3464568fef3b382755b8e8f474c00a489dcc90a1e2897e92a810486df83282c6c5593062fad47b1c55e04f19b3c0f17e31db80d4f38dd5d64aa2ccdf2f962cc32c4a7b87cb91921f9f4e6d438a40a09b40af92887bd9dacd2e852bd7ded1434612d3be8556685126056060668b8ef88dcf242a69854091f4d0fcfb567f5a16a6df4ad88b5dc25be7aba8696a57d4037458c3b487b91344d5b135371d95603959bba093919b13fd29c0b1c176e258882955f5ac213153c011395952a6c14aef83c5255cbacd37b6ca2617141123eee7948d696d67f9e90f8c5d94033c5b3487e696357b8d5244456f41aab6b1096466198839060365b37309b24361cca66d62f7f0795b458da229064c1fd99b9c2a64baab590a4c77ea932c40b8948abdd8bfc27f8bc8dc7f672c861199fb2905fc044be6bb9c16a5ece754dc0520cf1ae75197a5dd244a7051d39789c555dbfbaf5c8a68e5c542b420e7c7b71a759e22953195f7896fdf0df15666642f53d7fabe4f00be6315354613234647dda950f0d9e88fecaed5d1db3c468fa6e96062999f36d0d8dc934dc90d6cc505b4d93a619a13b55aba14a0ed91d885c5da1456c1d2ceee9b9ab7edcbea9506fa37ba01f9822e56e75b09dcc7623287a9bd09043d1a437e70d82853292a48c34c164b0883281429aae515ac7e51814ffaeb3f79dffa70b935e964eb6fddbf0180e9b6ac22d5a1cf516e686a879970aa89e24ab13036606a397437fd22cdb107fdb19a26c15cc6f3985d6082b297d3671c7f46f2961291510c489b1ad2bcdeda68bc2afac735c5885a3c1f06befbf3752563253c1bdf50a18efab95dbff92142744beec8eae9ee91eebf74b57ded473c7f9f0fea5f2cdecf62872a52688b83fe76ac9c4b0a7c851459eec51009c230782697f75d11e2581a6a6d83c95eb112913172c88ff9c562631b54645fde5b2c0c1372f8637b01365364ed439079c85e060bf1b2f2270419e0c159200d551c119a675a9d4690f210fe7b11c58e1d58560384a413885f53c022c9496486168512f46cb581a2dc879c6cec5f6dcfc0c22733853208d4da18532b5ac97b00fe6c0780b242609805aafef7c5fe8f9abe47aba903dc880cfb1fb9268f962f0534d897d81e12c2bd14a8f0545c05c45a6bc12331fb1fbca1271df8288787d5ee5e172b1f851e6e335f2e4f4dc1604084b93104a6b8862fcba97ed7411be93f46ffe8ff6d614ee68bf34fa499eaf80bec9f111988f51329ccc31eee5d5b2a63aaba9512949872d5a1480ec76bd0f6056bfcf1170c7e476711446379fdf88fb7f41a32489b57864dc43f5650cb48e196197fc622e32789101af9ac972dddd4cd5081cf2fc2355ec9acb17705d844d78e67217862597811aa8e1f7981fdad50e3a1cb63e7fcece407ac27952499ff5c962d93824a17a945f0e33df03cf72601ff5b609848ec0e9988caa7a806eec611b646eb947201b76d44591b3401e553ceda57fcf0cf55660ce0c6263f9e2affb8e9582f7c9ce3ef691a46e628d29b3a72b243abec101e1c3a999b9b97d72d12eb7244cb1e18ac093bcb900901fea1bb2acbc71e2adc8d8803385f0209e811b553e76113b1effd1efc74a7e7ba433cf74b7bbd83737836083b06c0df556ffba6f744366698707a51c26c9dd60d9722a8effdc366f0663c6fa48383f0950408f7b2ec76ee3b74bce7454f38ad2ee73f8abd961407c703a28336746f46d77cfab4082736dc04cea66fd1aad329368c5fc70ae7982951f188f06f6ebc707894ec6a31194252def4186eb57401728af940ed64bc7589c08e5d8aa1a86be57344a1e569917824bf9f53ddc08bb0cec189c848e61e0b62fc2eda5c54b4d54b2b327cf7185df7af52f353fa7a953f1ae7626773633e00dd42710999710cf7cd8395bffba8417205d2209550250f73b4efc331f78dec71b1d29ecbef69d4d03b07f8c49f4bc4890fcad3df69110f347fbb3077a7e4581b3aab890e0fe0ba8850d80e9f42bca5e67fa7a47455c4dd2dddd77ef6827be5a34e92b8f599bff6cccc265a5982e874b6f56b961fc39e6f2c01c8d71ff236f9ec5feda8d60aced0428852c8d23896a93626214ff9b6ad02378e3534d72418b2e1cbee9966184573f2e2f1a15d55cc75e489405d6fd05880b31fea758d7b222633749b794b9fbc79b458c3564121847d3b3baba4b5e79bbba1187da12175b2ba12485481d5b2a66d3d28d499ce9fd74d4084c455a7eb06e3d44ecd29e0cddab9285b974ee0380127bdd53f8061c30a91d182275a1a4e89544ae80a7bbcc0fa04a20b4ebf2e2fd9efb71cbbdd8943add3d70523d4553933c2ef053ced4b937aa2c07ade1f3aec4ad736731de62f2f913d8898d68e79782a27a0b123734912f4ff51d390c5c1aeef6079c5b50590e2f4c0b0c2673fc1316450ffcdcbc716834eb093e1d1f91e22fcfe7136e9d98c73d9980d9d4feac7d37e75b8fdcb8ebf1eb3542da99f575734bd6de28dfe30dace694f197a3c69ea2885e34aff79134a4d5390dcd4f07dcd1353db714923f36d3f6899146fe9576191eef427e34003e0feb89884023f4e27ec5b0b0279947756299de9961716faf1a75c7a9673b53360d8866f7791754d461659c2534ce3b99311e61d0c0650b0bd96ac039a48ce7f6dc57f7f1a911185e4bbf7f439be2cab602551732861aaa29ceeba89be78a683257062b935d334fe30aaed080e1b37b9e564f07252136e3119b5828af11dd58459936e911bca0adf27ea8422f42346e26ef253670524f32616e7be63146888e6fc1ece66718360322e2a05358b07c690666248d8c05db5b0632f32307e2d67618071cbf5d2b8275dfaa78d07c6900c6bd07bc39ad3d44d13ad1b12eb4bb90bf5b256b40d9dab333102aa1f52b0705ad29633c20a85476a0f416c8380dc392043e5a33855f80117c0622f62307c7aab123b77a8eebfa5523804d5ef939a38ae6c9c6edc7fb485b07c12361a4e5c871512892d4e6af9b7efe41d9e960de23ec17035b6371a91a7809c507910615b5e9e10a1f243bbbbc635c76c8077990cb65f4d2013e064bc7de38054435cf7b293117422fcbea23dfa29dbe9378dc157db441886c01d18cdea624f6a1bdc3f5f309e364863253f144224242eb13ece0afe9f02a269f6f57253e32155efd77580cf461129aaf2a56b9557b66b62edf43ac8f51123e00509529f7cef9dad0768a39c13969112af538ea846a0d525ce2eb8ea04557dc57a156e639a0fc29c7c8bb000bf9cd8a71664cf04ebf46367fa1e1f7b377156e4e356eb564089323d6bf5b7c612adb6bf3c45f247ecdf93e1a51a2d48086a30efcbd5985efda96dc243d1209868893b05bef5f9f0ee9ba5981a644dd59b5f60dcbd2a3ee935bcf87079085606312eaf9e4f4b897bffe12d3e6d38449b617f0f598bc8befa145db3c88b7912a12eb577befc777bd277d427b0bdf26b67c7724da96c3533b24770f143fae10d3a94d8296ddd2a1f1d9b1fe5161e77872eb00cfcc8e23fd125c809e026a6788d36a9ff28f4dd1f571df58010107996ed26526b828c632879a0938760596afb107281da751353581dc1d196a51f38f98679206d2affa3ca1e99886e8a5947c352ffcc7347d12c80396289b0f680ff90f338e7bcbba60d88e73037191f699c8626e50b9ed39ebca4b3a007a4b8656ee9231e27931e82b50efe19a5e78621e96cab39b3d9e6f48a9eaae671aac57fad8e8b2c8e1bdfef135ba12d22f146c5eacad5a8a8319223e64371a9f976287cf15641774917d2e8f3484da13c6211906feab2efae9cf6b7484a6e10321933a25b26b1c10dca24543db1fc2c4f8a0b41fe1a7a817a51a09b1465ed2297640e8850dc20cfaac98e60876fd19fb9eb99f6787ad5253e51fe40849d0607ed358a57bfb32fec84ca130858999c3a9d49c36c082b29ff9b7568402ea022a37b7cbeee1ac1d7548a089b932c20427f103bb1825e982924b069d04f3fb80d42bdb720c92852c2f1016edc3ec79fd31c84df9fcdf67f5f394a1166ad4c791d3fe6a37b0c5ed74e1bf72f7fd8a80f433090a451c0ce118537b5b9a5ced644b745b97a0c554fa156af8f309e610af80244f53446410a5d8f4ac966c3f654e2608c22865840e30a460c19fe157679d299b2322cb49371a81c532400d70e2ee5903980cf44b6aa9d32ba5adf8cc18de0a96bba9fdb76737cbe1a4a49d0e2", 0x1000}, {&(0x7f0000001780)="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", 0x1000}, {&(0x7f0000000100)="6703da49f2bd1b48baae565fa33b321e5c67e72cdc20ed9f8d2dc8aff81b", 0x1e}, {&(0x7f0000000140)="9f0c90053957", 0x6}, {&(0x7f0000000180)="9392f56baf860e918590f10190830ed60426d7fefd1e27a3c1bc04459c0bb7d2b0b0fd3e779686aeeae3235ac5abe1c8e646f7b6c70e72a637846cbf9c79ebb69b65cb4eba7ca19794eb1a924a1167de1c48f9b86930900b16ad4e5fb99a0d5bc3e9aa69de1ef92228b185fb", 0x6c}], 0x6, &(0x7f0000010e80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @broadcast, @multicast1}}}], 0x20}, 0x4080) 17:38:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600ffffff", 0x0, 0x103}, 0x28) 17:38:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)={[{0x2d, 'memory'}]}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 545.158563][T24578] device nr0 entered promiscuous mode 17:38:03 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x9effffff00000000}, 0x0) 17:38:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300586522008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600ffffff", 0x0, 0x103}, 0x28) [ 545.729466][T24578] device nr0 entered promiscuous mode 17:38:04 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) socket$kcm(0x29, 0x1, 0x0) 17:38:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000001980)={r1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r2, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:04 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0xb000000000000000}, 0x0) 17:38:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300008122008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:04 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:04 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 17:38:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000020000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="230003bd22008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:04 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0xffffff7f00000000}, 0x0) [ 546.052863][T24629] device nr0 entered promiscuous mode [ 546.084316][T24627] device nr0 entered promiscuous mode 17:38:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x7d, 0x60, &(0x7f0000000080)="08bfc761708d478eaa17fadd172e6c60d1e25cb11217bf81380186cfc63840afae1fb75a969e4ef2483e76c3e67cf142c24c1618aca0270363b536651f3c60fcd33263248a7d375b786da293c0785e5fc107becd0e8e9ec8ceafe2faab3e4f12eeb7e7cc51e31b4db305e5087632cd8ab3505aeffd28b081dbd355f9db", &(0x7f0000000280)=""/96, 0x200}, 0x28) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 546.637434][T24634] device nr0 entered promiscuous mode [ 546.730332][T24629] device nr0 entered promiscuous mode 17:38:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200), 0x0) socket$kcm(0x29, 0x5, 0x0) 17:38:05 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0xffffffff00000000}, 0x0) 17:38:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d016e3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="23000ec022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2d, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0xffffffffffffff69) 17:38:05 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0xfffffffffffff000}, 0x0) [ 547.034421][T24669] device nr0 entered promiscuous mode 17:38:05 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0ff2adaffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e12c7b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) r2 = getpid() r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r0, 0x0, 0xf, &(0x7f00000000c0)='\',uservboxnet1\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, r3, 0x0, 0xa, &(0x7f0000000080)='syzkaller\x00', r4}, 0x30) 17:38:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:05 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 17:38:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="230000f022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 547.341948][T24698] validate_nla: 4 callbacks suppressed [ 547.341957][T24698] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 547.407942][T24698] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:06 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\x00') 17:38:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'io'}, {0x2d, 'rdma'}, {0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'memory'}]}, 0x1e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:06 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x3}, 0x0) 17:38:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="230000000f008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x400}) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) close(r1) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)='nr0\x01\x00') write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="2d000462f41c2e5768"], 0x9) [ 547.836816][T24722] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 547.865697][T24722] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:06 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg(r0, &(0x7f0000007700)={&(0x7f00000073c0)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001b00)={0x6, 0x1, &(0x7f0000001a00)=@raw=[@generic], &(0x7f0000001a40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x13, 0xc, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0x40}, @alu={0x4, 0x7f, 0x8, 0xb, 0x8, 0x50, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x40}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, @generic={0x7, 0x4, 0x5, 0x7, 0xffffffffffffffff}, @ldst={0x2, 0x0, 0x0, 0x0, 0xa, 0x0, 0x10}], &(0x7f0000000140)='GPL\x00', 0xffffffffffffffff, 0xcf, &(0x7f0000000380)=""/207, 0x41000, 0x4, [], r1, 0xf8cb52880b37c024, r2, 0x8, &(0x7f0000000280)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xf, 0x4, 0x8001}, 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0xfd9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r3, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(r4, &(0x7f0000000300)={[{0x2b, 'memory'}, {0x0, 'cpu'}, {0x2d, 'memory'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x23) 17:38:06 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x4}, 0x0) 17:38:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0xb750d2cc9f58128, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000005c0)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) r4 = perf_event_open$cgroup(&(0x7f0000000140)={0x2, 0x70, 0x1000, 0x3, 0xfff, 0x847e, 0x0, 0x2, 0x80120, 0x5, 0x7, 0x59, 0x9, 0x7, 0x8, 0x80000001, 0x9, 0xaa7, 0x1f, 0x2, 0x101, 0x7, 0x3, 0x2, 0x7, 0x4000000000000, 0x14875a67, 0x2, 0xff, 0x100, 0x7ff, 0x1, 0x101, 0x20, 0x7, 0x560, 0x4340, 0xffffffff7fffffff, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000100), 0x2}, 0x1aa2, 0x2, 0x8, 0x4, 0x0, 0x7}, r2, 0x7, r3, 0x1) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0xfff, 0x5, 0x80000000, 0x0, 0x62222d9e, 0x2, 0x0, 0xa701, 0x101, 0x83f, 0x6, 0x9, 0x2f, 0x698, 0x101, 0x8, 0x7, 0xdfaf, 0x5, 0x8000, 0xffffffffffffffc0, 0x7, 0xb535, 0x8, 0x1ff, 0x7fff, 0x20000, 0x3f, 0x4, 0xd7, 0x2e1, 0x200, 0xd5, 0x3, 0x401, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040)}, 0x10400, 0xe0000000, 0x3000, 0x1, 0xfffffffffffffffc, 0x2, 0x8}, 0x0, 0x1, r4, 0x4) write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000640)={0x1, &(0x7f0000000600)=[{0xc0, 0x80, 0x5, 0x3}]}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000580)={'sit0\x00'}) 17:38:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000222008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000001", 0x0, 0x103}, 0x28) 17:38:06 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="00030e8001000000000000009547c4578ad7026b00210500cd020071dd86dd00008848ba6558301f729422ad6c688342b9c39e80aca4b1d8c40176ec09b4280452fd79867a3f5fa452060d297f9401b4e35eb9e68b9adfd178514a941af96fe540551680107fdf79d1af8f4e56309ac9733d41cc0ff11999c3c3740f085a20"], 0x7ffff) [ 548.153751][ C1] net_ratelimit: 10 callbacks suppressed [ 548.153759][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 548.165291][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 548.171154][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 548.176959][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 548.233749][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 548.239616][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 548.247096][T24758] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 548.295278][T24758] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:06 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x5}, 0x0) [ 548.350162][T24766] device nr0 entered promiscuous mode 17:38:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'\x91x\x00@\x00\x00\x00\x00\x00\x7f\x00', 0x2000}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000322008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) [ 548.393887][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 548.399796][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 548.428906][T24774] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 17:38:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600008001", 0x0, 0x103}, 0x28) [ 548.473740][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 548.479620][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 548.491698][T24774] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:06 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x6}, 0x0) [ 548.704287][T24792] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 548.734306][T24792] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x5, 0x6, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000be000000000000001f00000018140000", @ANYRES32=0x1, @ANYBLOB="00000000000000009f408000428ea16f9500000000000000f01d32dd35bab2737294755651d8190dd1f27cb12ce25a1554ce7ed761a6e1d428d0aad88fdb88aa6318a29bd9d4a1adb1cc2bfbbb05e92f2f87d85bb0711c371bd9d024"], &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f0000000740)=""/4096, 0x40f00, 0x3, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x6, 0x7b51}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000380)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r2, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a3060000f0ff", 0x0, 0x103}, 0x28) 17:38:07 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x7}, 0x0) 17:38:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000422008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000040)) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000008c0000008c00000003000000040000000000000c05000000020000400000000902000000000000000200000d000000000e0000000300000009000000020000000f000000010000060400000005000000080000000000000000000009000000000000000b000000020000000f0000000200000002000000030000000d0000000000000c04000000020000000000000b010000000061000000000000"], &(0x7f0000000580)=""/142, 0xa7, 0x8e, 0x1}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000040)=':\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r3, &(0x7f0000000680)=0xffffffffffffff9a, 0x12) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) write$cgroup_subtree(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x7ffff) r4 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000100)={[{0x2d, 'rdma'}, {0x2d, 'mem\x18;y'}, {0x2b, 'rdma'}]}, 0x14) 17:38:07 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xa}, 0x0) 17:38:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000622008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:07 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xb75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f00000001c0)=[{0x7, 0xfffffffffffffffa, 0x5ff5, 0x3}, {0x934, 0x1, 0x101, 0x9}]}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='memory.events\x00', 0x0, 0x0) openat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r3, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) 17:38:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000200", 0x0, 0x103}, 0x28) [ 549.151383][T24815] device nr0 entered promiscuous mode 17:38:07 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xe}, 0x0) 17:38:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000500", 0x0, 0x103}, 0x28) 17:38:07 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xf}, 0x0) 17:38:07 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x48}, 0x0) 17:38:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10025}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"/269], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000140)='io', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0xffffffffffffffe1) r3 = openat$cgroup(r1, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(r3, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000a22008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) [ 549.910933][T24815] device nr0 entered promiscuous mode 17:38:08 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') r1 = perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x70, 0xc1, 0x95df, 0x81, 0x1, 0x0, 0x9, 0x8000, 0xe, 0x7fffffff, 0x9, 0x7ff, 0xfffffffffffffffb, 0x6, 0x6, 0x8fb, 0x6, 0x7fff, 0x1000, 0x6, 0x479, 0x5ee, 0x4, 0x59, 0x3, 0x9, 0xffffffffffffffff, 0x8, 0x7fffffff, 0x7ff, 0x2, 0x7fff, 0x4, 0x7, 0x8, 0xdbab, 0x101, 0x0, 0x401, 0x2, @perf_config_ext={0xd1f, 0x7404}, 0x40, 0x0, 0x3, 0x8, 0x8, 0x3ff, 0x7fff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x739a4251f687ee52) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x59c4ee3b) perf_event_open(&(0x7f0000003c80)={0x4, 0x70, 0x800, 0x227, 0x80000001, 0x1ff, 0x0, 0x45, 0x10000, 0x8, 0xffffffffffffffff, 0xffffffffffffff01, 0x8001, 0x80000000, 0x1c5a088e, 0x10000, 0xffffffffffff4c43, 0xda, 0x15f67a9e, 0x47, 0x10000, 0x513dbbe7, 0x1f, 0x20, 0x2, 0x6, 0x5, 0x4323, 0x7, 0x3fff800000, 0x10001, 0x0, 0x255679dd, 0x8bf2, 0x5, 0xf37c, 0x3, 0x400, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000980), 0xa}, 0x4000, 0x15b, 0x800, 0x3, 0xffffffffffffffc0, 0x9, 0xa8}, r2, 0x5, r1, 0x9) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x5, 0x1ff, 0x6, 0x8, 0x0, 0x2, 0x9006, 0xa, 0x1000, 0x3, 0x6, 0x8, 0x8000, 0x3f, 0x81, 0x4, 0x8000, 0x5, 0xea, 0x7, 0x863, 0x1, 0x5, 0x10000, 0x8, 0x9, 0x7, 0xf4, 0xffffffffffffffc1, 0x2, 0x7, 0x7ff, 0x100000000, 0x0, 0x8a, 0x4, 0x0, 0x80000000, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa46f57bb56daa3ed, 0x101, 0x1, 0xb, 0x6dc, 0x3ff, 0x8001}, r2, 0x3, 0xffffffffffffffff, 0x9) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000380)='cpt\x00') r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) r6 = perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0xe5d, 0x2, 0xffffffff, 0x2, 0x0, 0x845, 0x5800, 0xd, 0x100, 0x2, 0x1, 0x6, 0xffffffff80000001, 0x1, 0x8b6, 0x101, 0x80000001, 0x4, 0x2, 0x6, 0xff, 0x6, 0x3, 0x200, 0x81, 0x4, 0x1, 0x4, 0x80, 0xffffffff, 0x3, 0x1, 0x4, 0x8, 0x9, 0x6, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000180), 0x10}, 0x0, 0x9, 0x1, 0x6, 0x6, 0x4, 0x200}, r2, 0xd, r5, 0x18) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f00000001c0)=0x40) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="00030e80493f1ec2cec9607e8847c4578ad7026b00210500cd020093dd86dd00008848ba6558301f729422ad6c688342b9c39e80aca4b1d8da0176ec09b4280452fd79867a3f5fa452060d297f9401b4e35eb9e68b9adfd178514a941af96fe540551680107fdf79d1af8fee7ec9878f4e56309ac9733d41cc0ff11999c3c3"], 0x7ffff) 17:38:08 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x4c}, 0x0) 17:38:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600006000", 0x0, 0x103}, 0x28) 17:38:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x2b, 'rdma'}, {0x2b, 'io'}, {0x2b, 'cpu'}, {0x2d, 'cpu'}, {0x2b, 'rdma'}, {0x5a, 'pids'}, {0x0, 'pids'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x37c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000c22008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:08 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x60}, 0x0) 17:38:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a3060000f000", 0x0, 0x103}, 0x28) 17:38:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) r1 = socket$kcm(0x11, 0x2, 0x300) recvmsg(r1, &(0x7f0000007700)={&(0x7f00000073c0)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001b00)={0x6, 0x1, &(0x7f0000001a00)=@raw=[@generic], &(0x7f0000001a40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xb, 0x4, &(0x7f0000000080)=@raw=[@jmp={0x5, 0x800, 0x2, 0x0, 0x2, 0x30}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, @alu={0x7, 0x7fffffff, 0x4, 0xa, 0x3, 0x0, 0x8}], &(0x7f00000000c0)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x7, [], r2, 0x13bb94e0885f9dd7, r3, 0x8, &(0x7f0000000140)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0x0, 0x9, 0x3}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:08 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000040)=r2) 17:38:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000e22008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:08 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x68}, 0x0) 17:38:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a3060000a001", 0x0, 0x103}, 0x28) [ 550.523810][T24906] device nr0 entered promiscuous mode 17:38:09 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r1, 0x0, 0x1, &(0x7f0000000180)='\x00'}, 0x30) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='nr0\x01\x00'}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r4, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x7, 0x4}, 0x0, 0x0, &(0x7f0000000580)={0x5, 0xd, 0x2, 0x79a4000}, &(0x7f00000005c0)=0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=0x4}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000740)={r2, r3, 0x0, 0xd, &(0x7f0000000280)='/dev/net/tun\x00', r5}, 0x30) openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r6 = socket$kcm(0x29, 0x5, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(r7, &(0x7f0000000080)={[{0x2d, 'memory'}, {0x13, 'io'}]}, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x7ffff) 17:38:09 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x6c}, 0x0) 17:38:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000005", 0x0, 0x103}, 0x28) 17:38:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000f22008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) [ 550.912126][T24906] device nr0 entered promiscuous mode 17:38:09 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x74}, 0x0) 17:38:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a3060000003f", 0x0, 0x103}, 0x28) 17:38:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000080)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="f572a4dd155edcd0e5a6ca3608c3f3681b5ba909ecf8f71cf9d0cf5b792088343b720d25f362e3d847bb8c02059c633d4bb2d2f0cf22c72e6ff5090ec74d81d8d45554becfdeba3b42287577ee83f2a41d0a71e283a59b6277fef5c1b06985dcfb21445bdec51a4def1dc3e346883db85a62", 0x72}, {&(0x7f0000000380)="4e588c8fa145affe725c7ad101c23562894e82a98f64d093c3f687095779d1b0c4b101581defa75019c7a95e84880cd9bf182de2b153cb2301ed7393fcb48aa3c42eb864a8a9d4526f7c69c2a2dd23295a7bab6494d015badf973fa65d2919e64568f2bd0a2f76ed0c1663a078c4bbd86a175a50114ebb781d80711c0434946d38e0be5e4f810d3ef144", 0x8a}], 0x2, &(0x7f0000000740)=[{0x1010, 0x114, 0x5, "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"}, {0x48, 0x5b8a5e6623ea8e65, 0x8000, "f3e7ff67329f670549635e1ac437fcff731ac1cef357bf6291451d1be410eb11694ea11eb40f4c5e1c59c491a8a07cd8b6"}], 0x1058}, 0x20000c0) 17:38:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300001022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) [ 551.457215][T24937] device nr0 entered promiscuous mode 17:38:09 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="00030e80493f1ec2cec9607e8864c4578ad7026b0040000000000000dd86dd00008848ba6558301f509422688342b9c39e80aca4b1d8c40176ec09b4280452fd79867a3f5fa452060d297f9401b4e39adfd178514a941af96fe540551680107fdf79d1af8f4e56309ac9733d41cc0ff11999c3c3740f085a20000000000000"], 0x7ffff) 17:38:09 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x7a}, 0x0) 17:38:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000040", 0x0, 0x103}, 0x28) 17:38:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000c5a6"], 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(r1, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) [ 551.617871][T24933] device nr0 entered promiscuous mode [ 551.888707][T24968] device nr0 entered promiscuous mode 17:38:10 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') socket$kcm(0x29, 0x6, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000680)={&(0x7f0000000200)=@id={0x1e, 0x3, 0x1, {0x4e21, 0x4}}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000240)="cd660abd61328dba1125e40a05308cb2876ff37e048300c633fe3226284e360c8420e3b4e2144d568f22231afba494e4390914a2b460db7eea77b48a9115f4a46cc27d8374310161fbed3c924551a90a36adf5eb33ae6dbc96826bd919d4f955aa1c51611b9193620185aca1b69ad3224760da48c258ab61df699e3afbda4b65e2ec32597cba7b6c18131c1c3ed3c4e9e12143559254ad0a4c43801569064c82008f70063cf62990b7a53b43b1df4c933039bbc850eac362d91340fe", 0xbc}], 0x1, &(0x7f0000000580)="b07e5c4f8ea2190ff5431599deb6c0efb2fd2900c2b3dd9d453d706f96952c09a196b350fd4ee5f6899a31391df9489028c6a874932741a40083a03ce29d918a3605e95292802ec378e768e53814ca10941ff0cedd55d290fe760c109c850a5208c1f9003e8833b9f8991058becb0cf92c4937a4fe6be0cbaf09e6661100d4b2d8a755c843a7fff0f7c045a0f3ced362f9325ccee653459c285e0aa4b49c8a5d47fad46ff40285646466a2abb1026f8a2b6fc1fcbcadf6069939005c0e790a8f4d6a730923029ddfc69e9f314cd9df3421484475d11d8f1498dc0e8b51dc00e6a1d70cbafc2a9d3a", 0xe8, 0x1}, 0x20004020) write$cgroup_subtree(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x14b) 17:38:10 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xb0}, 0x0) 17:38:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300006022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0xb0b, 0x7, 0x7f, 0x80, 0x0, 0x6, 0x1c, 0x4, 0xff, 0xff, 0x429, 0x80000000, 0x1ff, 0x6, 0x6, 0x81, 0x8, 0x60d0, 0x40, 0x7ff, 0x9, 0x5, 0x3, 0x5, 0x20, 0xfffffffffffffffa, 0x100000001, 0x8, 0x75841cad, 0x9, 0xf, 0x1, 0x6, 0x80000000, 0xfffffffffffff7ea, 0xfffffffffffffffa, 0x0, 0x100, 0x3, @perf_bp={&(0x7f0000000140)}, 0x2, 0x8, 0x100000000, 0x8, 0x8, 0x4d12, 0x7}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, r1, 0x0, r2, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) socket$kcm(0x29, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x6, 0x5, &(0x7f0000000380)=@raw=[@alu={0x4, 0x10e, 0xc1e8c378565b9618, 0x0, 0x7, 0x6, 0x51bd95bcee901de7}, @ldst={0x3, 0x2, 0x2, 0x1, 0x0, 0x1, 0x4}, @generic={0xc000000000, 0x0, 0xfffffffffffffffb, 0xaf23, 0x80000001}, @call={0x85, 0x0, 0x0, 0x56}, @ldst={0x0, 0x0, 0x6, 0x5, 0xd, 0xfffffffffffffffe, 0xfffffffffffffff0}], &(0x7f00000003c0)='syzkaller\x00', 0x7, 0xd4, &(0x7f0000000400)=""/212, 0x41100, 0x6, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x5, 0xfffffffffffff839, 0x9c}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000060", 0x0, 0x103}, 0x28) 17:38:10 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xf0}, 0x0) 17:38:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) recvmsg(r1, &(0x7f0000000580)={&(0x7f0000000380)=@rc, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000400)=""/131, 0x83}, {&(0x7f00000004c0)=""/168, 0xa8}, {&(0x7f0000000640)=""/215, 0xd7}, {&(0x7f0000000740)=""/133, 0x85}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/46, 0x2e}, {&(0x7f0000001800)=""/187, 0xbb}, {&(0x7f00000018c0)=""/179, 0xb3}, {&(0x7f0000001980)=""/128, 0x80}], 0x9, &(0x7f0000000300)=""/44, 0x2c}, 0x10000) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000004180)={&(0x7f0000002ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000003fc0), 0xa, &(0x7f0000004080)=""/220, 0xdc}, 0x100) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000041c0)=r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x1, &(0x7f0000000600)=ANY=[@ANYRES64=0x0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="00696f202b63707520195972d337db591e449b7916b56e9f19533837a505820b63aa0f3e832a2aa119c2ca5bb5f42c51db31c47a6c28ed840f7cd362bc24060a01e5e352d242fbcf6440b1e2e801ade791deb804ad1724ae0f4320"], 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r3, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 552.177311][T24988] device nr0 entered promiscuous mode 17:38:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a306000000f0", 0x0, 0x103}, 0x28) 17:38:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0x11, 0x2, 0x300) recvmsg(r2, &(0x7f0000007700)={&(0x7f00000073c0)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001b00)={0x6, 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="00e3dad7bc1834a509e80050f2f4bed8d919319da2ff3fb69537cb89b1b608cf25aeca162d5ced9e01c26a9e996d3073608a4d6f1dde5625c870cab6bd781ece04bbf1845bac4ad61634fcd73e2ff682791f1a40bce879971a1760f99ed172120574b05188b468d893dc3936d2a00b5191afadb78a3b0e972ba5bce79ded61437f25119ed29f5ddb5e63584db656b3c77701dd2a4afbf54af9a3fd7d5d303a9f98ad4c5c576be144d2a4f244a36703dee31307d8efcf1c6e28e39c22a9c10ceef97b5de5e60cd38ede9a2593302c03c26a7adf41f3dc507472ca74c96ce65ae3"], &(0x7f0000001a40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$kcm(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@xdp={0x2c, 0x8, r3, 0x39}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000100)="256c87bc2faedbfa23cbfb407d4324ebde3ddc1bda7baaa4ca68b7544d4f83631dd5922021fe99c237fa65c51ec6b618ee", 0x31}, {&(0x7f0000000140)="00b2b862ff533917706b511788eeb5933113b5d25c74e32e3c447d26e6252759c4651867460844d026800a8712c16c884bea8e796f5d863b78cbd9cbbba03273270db498314b8e95636f357637304407c16d61f71f6ae78394ea1bb6f005b153eaa078e3bab6831b32fe1ba92f487ebd9dc7504915a614", 0x77}, {&(0x7f00000001c0)="e4697d7450e46aa3b9e016506621f96128f8d0fbb3d08b1929408825038b36e92d1a6deccc75a1eb71d5ddd8a8940947d577fda3111b410b230d559381b430b8", 0x40}], 0x3, &(0x7f0000000580)=[{0x40, 0x10f, 0x1, "3005256a85f3272ddb7ef9f1d480d456aa659c0db63719414a938b28e10566de81aebfc1fb4f25c67ba7d0"}, {0x68, 0x7606a58a22fc8f90, 0xffff, "a1982716678485519a4b767ee5121da2788fb7cf78eca358ea7bb53acae61e4b6008c5041b7388c43a2d0f09c811d74a1715503db0752177820a267979068fdf3883e59fb3ee376d9957fa70c8e3946c9f71acab7c6770"}, {0x80, 0x112, 0x9616, "26dfe229c6416bdc15e587142cdb06ad905fa5ee4f8160599a68405bf5ecf9d6b0d3f7b92f2978c11e0b4999ab20a91749438793b496e2a5f8d76000c7f40a133cd1d47fec086de4c98c7df0673c3297cfa253f6728deac5f952c94541653cf1b3d24935f68a0a89e380"}, {0x50, 0x88, 0x8d9, "7fb73dc1a4cd5008e1a5d7999d74ce76201df3858629f437b2b1782d17bef560431cd95a9e829eebcb16bc2cffb816f3873a0c5a2a825d0d8ac0"}, {0x18, 0x0, 0x8, "db919c1042e1"}], 0x190}, 0x4000) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) r5 = perf_event_open(&(0x7f0000000740)={0xe, 0x70, 0x7, 0x1, 0x53ef078b, 0x5, 0x0, 0x7, 0x2000, 0x1, 0x90f, 0x5, 0x3, 0x9, 0x1, 0x8, 0x5, 0x7, 0x5, 0x100000001, 0x3, 0x6, 0x3, 0x1000, 0x55, 0x4, 0x9, 0x2cb9, 0xfff, 0x1ff, 0x2, 0x9d, 0x7, 0x6533, 0x80000001, 0xee, 0xfff, 0x9, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000300), 0x4}, 0x6, 0x81, 0xffff, 0x7, 0x1, 0xe0, 0xbc}, 0x0, 0xa, r4, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0xffffffff) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000900)={0x1, 0x70, 0x88, 0x100, 0x2, 0x100000001, 0x0, 0x400, 0x20, 0x0, 0x44c9941e, 0xe9a, 0x1000, 0x0, 0xffffffff00000000, 0x9, 0x400000, 0x9, 0x1, 0x58, 0x7, 0x9, 0x0, 0x640, 0x0, 0x1328f33f, 0x40000, 0x2, 0x5b, 0x6, 0x0, 0x6, 0x2, 0x4, 0x40, 0x1ff, 0xc00000000, 0x1822, 0x0, 0x8, 0x4, @perf_bp={&(0x7f00000008c0), 0xa}, 0x4, 0x8000, 0xbd0a, 0x7, 0x4, 0x7f, 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x400, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:10 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x300}, 0x0) 17:38:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="230000006b008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) [ 552.446521][T25010] validate_nla: 26 callbacks suppressed [ 552.446532][T25010] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 17:38:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a3060000a001", 0x0, 0x103}, 0x28) [ 552.572566][T25010] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 552.788874][T25015] device nr0 entered promiscuous mode [ 552.960298][T24994] device nr0 entered promiscuous mode 17:38:11 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000040)=0x1) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) openat$cgroup_ro(r1, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x7ffff) 17:38:11 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x500}, 0x0) 17:38:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a3060000ffff", 0x0, 0x103}, 0x28) 17:38:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="230000000f008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:11 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x21, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0xca, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = getpid() r3 = perf_event_open(&(0x7f0000000380)={0x5, 0x70, 0x1, 0x7fff, 0x6a, 0xff5, 0x0, 0xcd, 0x80, 0x1, 0x9c0, 0x65925221, 0xffffffff00000001, 0x3, 0x0, 0x4, 0xb2, 0x5, 0x2, 0x4, 0x69f0, 0xc6a7, 0x2, 0x1, 0x100000001, 0xffffffff80000001, 0x6, 0x0, 0x8001, 0x8000000000, 0x723f, 0x6b803b0b, 0x9, 0x100000001, 0x596, 0x200, 0x8, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000040), 0x7}, 0x9400, 0x4, 0x2, 0x3, 0x200, 0x2, 0xb5c3}, 0xffffffffffffffff, 0x4, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x9, 0xffff, 0x8, 0xffffffffffffffdb, 0x0, 0x0, 0x2, 0x3, 0x0, 0x2, 0x8, 0x0, 0x3, 0x80, 0x400, 0x4, 0x4, 0x6, 0x3, 0x7fffffff, 0x1, 0x5, 0x401, 0x4, 0x6, 0x8000, 0x5, 0x3, 0x6, 0x7, 0x100, 0x14, 0x2, 0x9, 0x3, 0xfff, 0x0, 0x0, 0x1, @perf_config_ext={0x200, 0x101}, 0x4, 0x2c, 0x6, 0xf7c05cc00a15cda2, 0xb64, 0x5a4, 0x2b08}, r2, 0xc, r3, 0x8) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r4 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000040)=ANY=[], 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 553.141960][T25012] device nr0 entered promiscuous mode [ 553.184054][T25031] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 553.227269][T25031] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r3, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x7193, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x7, 0x1}, 0x0, 0x0, &(0x7f00000004c0)={0x2, 0xf, 0xb057, 0xf85}, &(0x7f0000000500)=0xc2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x401}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r2, &(0x7f0000000380)="fb5343ea75b42dc415ccb56d0c03d70db53867f69e7ad3e636955357dfb9c4f806d2d333a8881ec68cc0d5356012c19659a4914a952c56822fd27db124a9c445c7f9bc3a4ee657f3ae1031820dd2c988fd0fcc2df00c5e215f68435240d238d73b9ef0068d4dcd1469894a9d82b6e3f30f0c0acb55ece81aad5eac0137443c46863de2800e9f1877b6f29d181a262ecab91b9a3c6dfa9b5584cd794dbab019a83485c9b59890820a452bef4567a6a7e2d2edb70d231ae5f5b38789d6cdd64a77559afd1f6087", &(0x7f0000000280)=""/188}, 0x18) 17:38:11 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x600}, 0x0) 17:38:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 553.405332][T25050] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 553.463021][T25050] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 553.714297][T25043] device nr0 entered promiscuous mode 17:38:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) r3 = perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x7, 0xee3d, 0x200, 0x8, 0x0, 0x61, 0x8089, 0x4, 0x2, 0x3, 0x9, 0x80000001, 0x8, 0x0, 0x40, 0xfffffffffffffffe, 0xfffffffff0df438b, 0x1ff, 0x0, 0x0, 0x200, 0x3, 0x769, 0x4, 0x8, 0x81, 0xfffffffffffff800, 0xff, 0x7, 0xffffffff00000000, 0x8, 0x0, 0x7fff, 0x8001, 0x2, 0x3f, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x10800, 0x5, 0x3, 0x4, 0x7fffffff, 0x80000000, 0x3}, r2, 0x6, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x37) 17:38:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="230000006b008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:12 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:12 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x700}, 0x0) 17:38:12 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) 17:38:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 553.916777][T25067] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 553.965325][T25067] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 553.982006][T25074] device nr0 entered promiscuous mode 17:38:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022028152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="00696f010000007520"], 0x9) socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$kcm(0x29, 0xa, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="b4000000119c000000000400000000000000000000000000000000580369192636d43628119b2224525279a4705798b7637d68a7dee27d9b8f58b241d609e3fba808c3e4b861364bc207dfa8b587b79d1b1c37786eb28d77a96f1af655aea36f67e7dcc26a45851279589ba796123ffdf7007f4fb21850607ba95c1538f92de301bc6a8497707bc94c1f3e3a81260375771753fd5e669b64779ede9e0ac8d4e13ea0e95807812f82ca7d2fbb69e030e5f8af6b0ae84b73ddee737d5c7940000000fdcf8851fe2106fa8557f74cd55277eadec9984d36f2d89f48dc87ccae87bff31a3d0c7d287737bba4"], &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:12 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 17:38:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 554.174384][T25088] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 554.227472][T25088] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:12 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 17:38:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 554.578080][T25078] device nr0 entered promiscuous mode 17:38:13 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000580)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,\x00\x00\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022038152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:13 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xf00}, 0x0) 17:38:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000080)='memory.events\x00', 0x0, 0x0) 17:38:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x7, 0x7, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc7d, 0x0, 0x0, 0x0, 0x9}, [@alu={0x0, 0x100000000, 0x8, 0x12, 0x5, 0xb9d3bc45e10c19e6, 0x10}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0xb62, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4c0b, 0xb4, &(0x7f0000000280)=""/180, 0x40f00, 0x5, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x0, 0x6, 0x4}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:13 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x2000}, 0x0) 17:38:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022048152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000004c0)=""/221, 0x129, 0xdd, 0x1}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x200000000000000, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x8}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) recvmsg$kcm(r2, &(0x7f0000004bc0)={&(0x7f0000004800)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000004b80)=[{&(0x7f0000004880)=""/75, 0x4b}, {&(0x7f0000004900)=""/184, 0xb8}, {&(0x7f00000049c0)=""/225, 0xe1}, {&(0x7f0000004ac0)=""/170, 0xaa}], 0x4}, 0x0) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004c00), 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000004cc0)={0x1, 0x4, &(0x7f0000000740)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x3f, 0x4, 0x4, 0x1, 0x1, 0x4}, @alu={0x7, 0x8, 0x9, 0x2, 0x3, 0xb9610a888ef99b1b, 0x1}], &(0x7f0000000780)='GPL\x00', 0x6, 0x1000, &(0x7f00000007c0)=""/4096, 0x41000, 0xc, [], r3, 0x3, r4, 0x8, &(0x7f0000004c40)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000004c80)={0x5, 0xa, 0x7535, 0x8}, 0x10}, 0x70) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000017c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000001800)={r7, r5}) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000002c0)=r8, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 555.001617][T25132] device nr0 entered promiscuous mode 17:38:13 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x3f00}, 0x0) 17:38:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 555.528324][T25137] device nr0 entered promiscuous mode [ 555.719229][T25134] device nr0 entered promiscuous mode 17:38:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022068152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:14 executing program 4: r0 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x6, 0x2, 0x7, 0x755f5cf9, 0x0, 0x8, 0xc41, 0x1, 0x439, 0x100000000, 0xfff, 0x9, 0x10001, 0x0, 0x2, 0xfffffffffffffff8, 0x7f, 0xfd8, 0x8, 0x9, 0x7348, 0x9, 0x6, 0x4, 0x7, 0x4, 0x7, 0x8000, 0xa13c, 0x8, 0x1, 0x2, 0x40, 0x0, 0x1, 0xa488, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000140), 0x20fa9a5d347f2233}, 0x10, 0x6, 0x596, 0x3, 0x8, 0xa4ff, 0x5}, 0x0, 0x7, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000080", 0x0, 0x103}, 0x28) 17:38:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x4000}, 0x0) 17:38:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETLINK(r0, 0x400454cd, 0x102) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x20}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000100)={0x0, 0x7, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x6}, @remote, @local, @link_local, @local, @local, @local]}) r3 = socket$kcm(0x29, 0x8dad8fa4452c2e4a, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r2, &(0x7f0000000580)="6c909484b34e089e8c4d9674be09ac4ee469df3bb3967a37b6aa70d3ae101b588bd918787de55320f4dcade7af711ceb90c1fbacce4055a75eae6091deb368469497ca153b33f942746732a85d147084c177967542926e423a918bf0e46062cde2bad8d3c7395d06bcfee585b44eddc876643a33f8a7e65a263211029bee68b8a3effeb1a43d62aa9669fd65890c7680bf9fe1816840206a54f45f0549638e22f3488cafa855e8378a3e18031ed8fb03fce99b1ad88123c9184bec22ab806a8ce6", &(0x7f0000000040)="03fae584b153b46774e5a9533fb4d10efb8046b9cf67e47c07e642411a8f8981f8741f06e2c2af93bd10346d1c93f49795f0b75293d4e0d408f7cb273afedd42c5673dbf8325634356c16e351bb3a81214127c19e858e04be919639c6919ef0146d663abcdb0f6e02e8bcfb6f81036cbfcb26c82c6a98191", 0x1}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="00030e80493f1ec2cec9607e8864c4578ad7020500cd020093dd86dd009531ab6516f891e1729422ad6c6883425abc9ac3c4a9aa8e3f82a787621be31b89b9c39e80aca4b1d8c40176ec09b4280452fd79867a3f5fa452060d297f9401b4e35eb9e68b9adfd178514a941af96fe540551680107fdf79d10ff11999c3c3740f085a20b77aa921d918c07984ff4a4bf2b3dd18b4f40000000000000000"], 0x7ffff) 17:38:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x4800}, 0x0) 17:38:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a3060000ffff", 0x0, 0x103}, 0x28) 17:38:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:14 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x3, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000100)=0x47b) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x11, 0xff, 0xe31, 0x0, 0x40, r2, 0x81, [], 0x0, r3, 0x4, 0x5}, 0x3c) write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x4c00}, 0x0) 17:38:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="23000000220a8152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:14 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="00030e80493f1ec2cec9607e8847c4578ad7026b00210500cd020093dd86dd00008848ba6558301f729422ad6c688342b9c39e80aca4b1d8c40176ec09b4280452fd79867a3f5fa452060d297f9401514a941af96fe540551680107fdf79d1af8f4e56309a143d3d41cc0f9c6cf2ecf1e65c5c5a20b7844773ad7bccd5641f01c420b398b883e35cc76257932992d038a08238d2858c3a416907cbd0e8735721512490d13380b244b7ee48f7819239f3e3434de88f7075181e25719dd5a78e4097d70fb2ca1ff117f660be092d464176bb3b31a53e5647e32ea51d04acfcd6faa63b709cfa4f8514e05116b04cab7a35bd71c434c98400"/256], 0x7ffff) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, r2, 0x0) r4 = gettid() perf_event_open(&(0x7f0000003c80)={0x4, 0x70, 0x800, 0x227, 0x80000001, 0x1ff, 0x0, 0x45, 0x10000, 0x8, 0xffffffffffffffff, 0xffffffffffffff01, 0x8001, 0x80000000, 0x1c5a088e, 0x10000, 0xffffffffffff4c43, 0xda, 0x15f67a9e, 0x47, 0x10000, 0x513dbbe7, 0x1f, 0x20, 0x2, 0x6, 0x5, 0x4323, 0x7, 0x3fff800000, 0x10001, 0x0, 0x255679dd, 0x8bf2, 0x5, 0xf37c, 0x3, 0x400, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000980), 0xa}, 0x4000, 0x15b, 0x800, 0x3, 0xffffffffffffffc0, 0x9, 0xa8}, r4, 0x5, r3, 0x9) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x7e7, 0x8, 0x1, 0x100000000, 0x0, 0x8, 0x20000, 0x1, 0x7, 0xfffffffffffffffc, 0x6, 0x3ff, 0x9, 0x5, 0x17a, 0x10000, 0x5b7, 0x6, 0x7, 0x5, 0x66d, 0xfffffffffffffff7, 0xe0, 0x6, 0x101, 0x9, 0x7ff, 0x7fffffff, 0x7c8, 0xffff, 0x631, 0x1, 0x8001, 0x7, 0x1, 0x3b7, 0x0, 0x3f, 0x4, @perf_bp={&(0x7f00000000c0), 0x4}, 0x7a77391015649b87, 0xbc2, 0x7, 0x5, 0x1000, 0x9, 0x9cf}, r4, 0x10, r5, 0x1) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) r6 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = gettid() perf_event_open(&(0x7f0000003c80)={0x4, 0x70, 0x800, 0x227, 0x80000001, 0x1ff, 0x0, 0x45, 0x10000, 0x8, 0xffffffffffffffff, 0xffffffffffffff01, 0x8001, 0x80000000, 0x1c5a088e, 0x10000, 0xffffffffffff4c43, 0xda, 0x15f67a9e, 0x47, 0x10000, 0x513dbbe7, 0x1f, 0x20, 0x2, 0x6, 0x5, 0x4323, 0x7, 0x3fff800000, 0x10001, 0x0, 0x255679dd, 0x8bf2, 0x5, 0xf37c, 0x3, 0x400, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000980), 0xa}, 0x4000, 0x15b, 0x800, 0x3, 0xffffffffffffffc0, 0x9, 0xa8}, r7, 0x5, r6, 0x9) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x8000, 0x0, 0x5, 0x0, 0x0, 0x2, 0x4000, 0x4, 0x4, 0x1, 0x7fffffff, 0x9, 0x9, 0x8000, 0x5, 0x3545, 0x212, 0x100000000, 0x6, 0x0, 0x7, 0x5, 0x1, 0x24f, 0x200, 0x0, 0x1000, 0x3, 0x2, 0x20, 0x0, 0x8, 0x7, 0x1, 0x5, 0x5, 0x0, 0x39c91e92, 0x0, @perf_bp={&(0x7f00000001c0), 0x7}, 0x40, 0x1f, 0x2, 0x8, 0xfff, 0x5, 0x9}, r7, 0x3, r2, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0x80000000) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)=ANY=[@ANYBLOB="010007000180c2000002b154f44d3f3100001caa0000aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa10aaaaaaaaaabb"]) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x250001, 0x0) 17:38:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a306000000f0", 0x0, 0x103}, 0x28) [ 556.416207][T25204] device nr0 entered promiscuous mode 17:38:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 17:38:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r4, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="23000000220c8152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:15 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x53bd4993, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) close(r0) close(0xffffffffffffffff) openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_all\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a3060000feff", 0x0, 0x103}, 0x28) 17:38:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x6800}, 0x0) 17:38:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="23000000220e8152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) [ 557.189023][T25213] device nr0 entered promiscuous mode [ 557.297729][T25204] device nr0 entered promiscuous mode [ 557.424786][T25210] device nr0 entered promiscuous mode 17:38:15 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x355) 17:38:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="8f80a3b10000000000"], 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r2, 0x0, 0x18}, 0xc) r3 = gettid() perf_event_open(&(0x7f0000003c80)={0x4, 0x70, 0x800, 0x227, 0x80000001, 0x1ff, 0x0, 0x45, 0x10000, 0x8, 0xffffffffffffffff, 0xffffffffffffff01, 0x8001, 0x80000000, 0x1c5a088e, 0x10000, 0xffffffffffff4c43, 0xda, 0x15f67a9e, 0x47, 0x10000, 0x513dbbe7, 0x1f, 0x20, 0x2, 0x6, 0x5, 0x4323, 0x7, 0x3fff800000, 0x10001, 0x0, 0x255679dd, 0x8bf2, 0x5, 0xf37c, 0x3, 0x400, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000980), 0xa}, 0x4000, 0x15b, 0x800, 0x3, 0xffffffffffffffc0, 0x9, 0xa8}, r3, 0x5, r1, 0x9) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x8, 0x8, 0x3, 0x7, 0x0, 0x2, 0x10, 0x3, 0x7fffffff, 0x5, 0x6, 0x8001, 0x6, 0xccdf, 0xfff, 0x20, 0x3, 0x34, 0x3, 0x2, 0x100, 0x9, 0x4, 0x2ac1, 0x1, 0x9, 0x140, 0xfff, 0x4, 0x2, 0xa3b, 0x9, 0xffffffffffffffe1, 0x9, 0x639, 0x7, 0x0, 0x1ff, 0x1, @perf_config_ext={0xfffffffffffffff9, 0x8}, 0x20000, 0x0, 0x1, 0x1, 0x6, 0x3, 0x1}, r3, 0xa, 0xffffffffffffffff, 0x8) 17:38:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x6c00}, 0x0) 17:38:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="23000000220f8152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a3060000ffff", 0x0, 0x103}, 0x28) [ 557.615816][T25255] validate_nla: 18 callbacks suppressed [ 557.615826][T25255] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 557.681932][T25255] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:16 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b70600007fffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624076646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r3, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x8, 0x1}, 0x0, 0x0, &(0x7f0000000300)={0x2, 0xe, 0x7, 0x1}, &(0x7f0000000380)=0xd30, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x200}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) socketpair(0x77d38362ea960825, 0x800, 0x3, &(0x7f0000001c00)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000000)) r7 = perf_event_open$cgroup(&(0x7f0000000880)={0x2, 0x70, 0x41, 0x5, 0x9, 0x100, 0x0, 0x1, 0x30046, 0xb, 0x7, 0x95, 0x9, 0x80000000, 0x7ff, 0xe52f, 0x1, 0xc6, 0x0, 0x9, 0x9, 0xe091, 0x1, 0x2, 0x5, 0x8, 0x10000, 0x8, 0x6, 0x7, 0x2, 0xae1, 0x7fffffff, 0x7, 0x2, 0x3, 0x10001, 0x9a3, 0x0, 0x50, 0x4, @perf_config_ext={0x437c, 0x6}, 0x0, 0x5, 0x7fffffff, 0x6, 0x2400000000000, 0xfffffffffffffffb, 0x4}, r3, 0xf, r6, 0x2) ioctl$PERF_EVENT_IOC_RESET(r7, 0x2403, 0xff9d) r8 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000001c40)={r8}) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(r4, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000900)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f00000009c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000540)={'erspan0\x00', @local}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000580)='syzkaller\x00') getpid() 17:38:16 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x7400}, 0x0) [ 557.778354][T25268] device nr0 entered promiscuous mode 17:38:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a3060000ffff", 0x0, 0x103}, 0x28) 17:38:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022108152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) [ 557.912915][T25280] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 557.968333][T25280] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg(r0, &(0x7f0000007700)={&(0x7f00000073c0)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001b00)={0x6, 0x1, &(0x7f0000001a00)=ANY=[@ANYBLOB="000000005f23a6f7"], &(0x7f0000001a40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x42, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r2, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:16 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x7a00}, 0x0) [ 558.148736][T25294] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 558.187044][T25294] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 558.288448][T25268] device nr0 entered promiscuous mode 17:38:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x870e73c23dc5bf78, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x2}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x1ee) 17:38:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a3060000ffff", 0x0, 0x103}, 0x28) 17:38:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022608152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:16 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xb000}, 0x0) 17:38:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/\t\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000200)={'\x00', 0x400}) recvmsg(r3, &(0x7f0000001d40)={&(0x7f0000001940)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000019c0)=""/245, 0xf5}, {&(0x7f0000001ac0)=""/156, 0x418}, {&(0x7f0000001b80)=""/217, 0xfffffffffffffd21}], 0x3, &(0x7f0000001c80)=""/161, 0xa1}, 0x2121) sendmsg$kcm(r1, &(0x7f0000000280)={&(0x7f0000000140)=@can={0x1d, r5}, 0x80, &(0x7f0000000240), 0x0, 0x0, 0xc7}, 0x0) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000100)=r6) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[], 0xfffffffffffffd7e) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) ioctl$TUNGETFEATURES(r7, 0x800454cf, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x10000, 0x0) [ 558.553753][ C1] net_ratelimit: 8 callbacks suppressed [ 558.553762][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 558.565208][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 558.571032][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 558.576826][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 558.596243][T25310] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 558.633769][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 558.639593][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 558.647966][T25310] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:17 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xf000}, 0x0) 17:38:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:17 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x28080, 0x0) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0xc}, 0x10) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000100)=r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, &(0x7f0000000040)="4bed84fa092aa35826b02f154b4b3beaa2ce9f46bfcb1c739fb8a0a65401563e166c6a84094f32ef615b834f903565f2fd3ca23d672bb4241d975eb61510fe24358287fd52798f09c6c1806ab4d55b0f38db4b214ca262f7875233334188f901031d9bdc3c4481c5036159517144174a2a59d3d36732be327a95409553add930d34f24788acf4f2c7cb63d8dbe4efcf3075ba62c0614b85429928d667ff9f92ca8eb38ac881f", &(0x7f0000000100)=""/89}, 0x18) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) [ 558.793841][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 558.799740][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 558.827951][T25329] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 17:38:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267020000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) [ 558.873798][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 558.879633][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 558.898465][T25329] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 558.998037][T25339] device nr0 entered promiscuous mode 17:38:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:17 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x30000}, 0x0) 17:38:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(r1, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:17 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x34000}, 0x0) 17:38:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001840)={0xffffffffffffffff, 0xc0, &(0x7f0000002c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=0xcb86, 0x0, 0x0, 0x0, &(0x7f0000001740)={0x2, 0x1}, 0x0, 0x0, &(0x7f0000001780)={0x3, 0x5, 0x5, 0x1}, &(0x7f00000017c0)=0x203, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=0x1}}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpu.weight.nice\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0x0, 0xffffffffffffffff, 0x0, 0x2c6, &(0x7f0000002cc0)='\'\xbd\xd9\xea\xb8\xc2\x06\xc6\b\xbb\xbd\x06\xbc\xbc\x9e\xa6uj\x97\xde\xc6{\xee\a=o\xbf\x7f\xecr\xd8\xfe!+\xdee+BJ\x8d\xa3\xbd\x93\xffK\xce\xad\a\x9e\xf4;\xc8v\a\x858g\xfd6\xdar\xc9GVN\xcecMCxSy\x1d\xf8\xd1b\'P\xd5\xf3\x1c=\r0\xe8),E\xb78[\xe0\xf8\xac\xb2\x9b\xdc\xe1x\xd1\xcdkY\x9e\x85E\xb6\v~\x1a+\x13P\xd4-EA\xa1E\xe9rI\x1d\xac\x1d7{\xdc\t\xb3\xce\xa8N\xf6\x820C\x10\x81\xe8E>\x1c\x19\xe5\xa3aO\b\xfe\x1b\xb3\x10\xbe\x13\x9eI{\xc4\r\xb4+,g\xe8\xa7\xa7b0s\xf2\x11\xbc\xa5\x0fW\xde\xd9\bJ%\xdd[\x85B\xd6Lw\x03\x143\xafN\ni\x88\xd5\xda\x01P\xfa^\xe3_\x87/\xff\x9b\r\bF\xdb%\xa1:.!b\x98\xf3\x1a\x04\x96\xf9\xd1\x1e)F\xe7/\xf6\x90\xbad\x83\xd0D\xb1{\x1fB\xca\x00\x85\x1aO\x19\xae\xddY\x98\x1f\xee\x99\x04:\x9c\x0f\xc3j|\xb2\x10]6\xb43\x9b)\xe8 \x15\xc3B\xeb\x00-\xc7\xa3\xa3\xbc_\x8eobI\xca\xf8A\x17\xd7 \x81\x1aY\xe8\xb8\xab', r1}, 0xfffffffffffffff4) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r1, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xe0, 0x4d, &(0x7f0000000380)="adedb1d0df5eafab271079ac006cb4cf7c086778ec47b0c669db84b4f64bffb1d1c54275264ac1600b8e0cd8c417a492b8c67d88636478c639c94f4edb0a9f07a090dfa1177a3751c234018c3eaa9c828824aca80efe41906196cd54866053b32863725bb57739d43f2877d657c43168cf002377693b939f6d951deeab75df32af232763908b00a03405ea837bafd2de7661ae1c92d7501a15f3d8815b6fc17331d3023befa28c36b28d4b755409e88140e4a3f845e4247b50183a098cccc53aa0b8c4fafd067ddf21ecbb473bf4a88e2f73f4392efbdfcd92d3168394b25dba", &(0x7f0000000280)=""/77, 0xfff}, 0x28) 17:38:17 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x400300}, 0x0) 17:38:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) recvmsg(r2, &(0x7f00000094c0)={&(0x7f00000092c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000009480)=[{&(0x7f0000009340)}, {&(0x7f0000009380)=""/57, 0x39}, {&(0x7f00000093c0)=""/72, 0x48}, {&(0x7f0000009440)=""/59, 0x3b}], 0x4}, 0x2201) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000009500)=r3) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 559.631051][T25346] device nr0 entered promiscuous mode [ 559.817023][T25386] device nr0 entered promiscuous mode [ 559.942656][T25346] device nr0 entered promiscuous mode 17:38:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETLINK(r1, 0x400454cd, 0x303) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') socket$kcm(0x29, 0xb9e1cb6a95337464, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:18 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 17:38:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267040000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:18 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d3cf6377538dc1cd4efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00', 0xd, 0x0, 0x0, 0x41100}, 0x1cc) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x10, 0x1, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0x19}], &(0x7f00000000c0)='GPL\x00', 0x80000000, 0x4a, &(0x7f0000000280)=""/74, 0x41100, 0x0, [], 0x0, 0xe, r2, 0x8, &(0x7f0000000140)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x1, 0x6}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xfffffffffffffc00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 560.127758][T25393] device nr0 entered promiscuous mode 17:38:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001840)={0xffffffffffffffff, 0xc0, &(0x7f0000002c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=0xcb86, 0x0, 0x0, 0x0, &(0x7f0000001740)={0x2, 0x1}, 0x0, 0x0, &(0x7f0000001780)={0x3, 0x5, 0x5, 0x1}, &(0x7f00000017c0)=0x203, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=0x1}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0x0, 0xffffffffffffffff, 0x0, 0x2c6, &(0x7f0000002cc0)='\'\xbd\xd9\xea\xb8\xc2\x06\xc6\b\xbb\xbd\x06\xbc\xbc\x9e\xa6uj\x97\xde\xc6{\xee\a=o\xbf\x7f\xecr\xd8\xfe!+\xdee+BJ\x8d\xa3\xbd\x93\xffK\xce\xad\a\x9e\xf4;\xc8v\a\x858g\xfd6\xdar\xc9GVN\xcecMCxSy\x1d\xf8\xd1b\'P\xd5\xf3\x1c=\r0\xe8),E\xb78[\xe0\xf8\xac\xb2\x9b\xdc\xe1x\xd1\xcdkY\x9e\x85E\xb6\v~\x1a+\x13P\xd4-EA\xa1E\xe9rI\x1d\xac\x1d7{\xdc\t\xb3\xce\xa8N\xf6\x820C\x10\x81\xe8E>\x1c\x19\xe5\xa3aO\b\xfe\x1b\xb3\x10\xbe\x13\x9eI{\xc4\r\xb4+,g\xe8\xa7\xa7b0s\xf2\x11\xbc\xa5\x0fW\xde\xd9\bJ%\xdd[\x85B\xd6Lw\x03\x143\xafN\ni\x88\xd5\xda\x01P\xfa^\xe3_\x87/\xff\x9b\r\bF\xdb%\xa1:.!b\x98\xf3\x1a\x04\x96\xf9\xd1\x1e)F\xe7/\xf6\x90\xbad\x83\xd0D\xb1{\x1fB\xca\x00\x85\x1aO\x19\xae\xddY\x98\x1f\xee\x99\x04:\x9c\x0f\xc3j|\xb2\x10]6\xb43\x9b)\xe8 \x15\xc3B\xeb\x00-\xc7\xa3\xa3\xbc_\x8eobI\xca\xf8A\x17\xd7 \x81\x1aY\xe8\xb8\xab', r3}, 0xfffffffffffffff4) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) r5 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = gettid() perf_event_open(&(0x7f0000003c80)={0x4, 0x70, 0x800, 0x227, 0x80000001, 0x1ff, 0x0, 0x45, 0x10000, 0x8, 0xffffffffffffffff, 0xffffffffffffff01, 0x8001, 0x80000000, 0x1c5a088e, 0x10000, 0xffffffffffff4c43, 0xda, 0x15f67a9e, 0x47, 0x10000, 0x513dbbe7, 0x1f, 0x20, 0x2, 0x6, 0x5, 0x4323, 0x7, 0x3fff800000, 0x10001, 0x0, 0x255679dd, 0x8bf2, 0x5, 0xf37c, 0x3, 0x400, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000980), 0xa}, 0x4000, 0x15b, 0x800, 0x3, 0xffffffffffffffc0, 0x9, 0xa8}, r6, 0x5, r5, 0x9) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x7, 0xecc, 0x40, 0x9, 0x0, 0xfff, 0x800, 0x3, 0x10000, 0x80000000, 0xffffffffffffff00, 0x1, 0xe9, 0x5, 0x700000000000000, 0x61, 0x1, 0x3, 0x80, 0x80000000, 0x4, 0x7, 0x9, 0x3, 0x10001, 0x100, 0x6, 0xffffffffe9355342, 0x51, 0x4, 0x83, 0x8, 0x1, 0x7, 0xe8, 0x4, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x7, 0x7fffffff}, 0x4000, 0x1, 0xc73e, 0x0, 0x4, 0x4, 0x100000001}, r6, 0xa, r7, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r2, 0x0, 0x10, &(0x7f0000000300)='GN\xe2\xac\x1b\x91\x86\xaf\x0f)1\xce\xe7B\x90\x00', r3}, 0x30) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000000)) r10 = openat$cgroup_ro(r9, &(0x7f0000000180)='cgroup.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x1, 0xfffffffffffffffc, 0x3, 0x0, 0x0, 0x6, 0x10000, 0x1, 0x2, 0x9, 0x100000000, 0x9, 0x400, 0x7f, 0x3f, 0x3, 0x7ff, 0x3, 0x0, 0x916, 0x6, 0x7fff, 0x224f, 0x80000000, 0x4, 0x7ff, 0x401, 0x6, 0x7, 0x8, 0x4, 0x3c8, 0x9, 0xfff, 0x0, 0x7, 0x0, 0x7fff, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x2040, 0x4, 0x9, 0x5, 0x2a, 0x2, 0xfff}, r8, 0xb, r10, 0x8) 17:38:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0x6, 0x8, 0x5, 0x7ff, 0x0, 0x800, 0x20000, 0x5, 0x75, 0x80, 0x9, 0xd529, 0x6, 0x6, 0x7, 0x5, 0x3, 0x80000001, 0x95a3a76, 0xfffffffffffffff9, 0x9c3d, 0xb5c9, 0x100, 0xffffffff, 0x41c, 0xfffffffffffffffc, 0x100000000, 0x101, 0x3, 0x6, 0x7f, 0x1, 0x387, 0xff, 0x0, 0x7, 0x0, 0x8001, 0x4, @perf_bp={&(0x7f0000000080), 0x3}, 0x10, 0x100, 0x1ff, 0x4, 0x3, 0xfffffffffffffffd, 0x7}, 0x0, 0x4, r1, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:18 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x1000000}, 0x0) 17:38:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) openat$cgroup_ro(r1, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) 17:38:18 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) 17:38:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 560.888200][T25407] device nr0 entered promiscuous mode [ 561.031637][T25393] device nr0 entered promiscuous mode [ 561.138592][T25405] device nr0 entered promiscuous mode 17:38:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000080)={0xffffffffffffffff, r2}) r3 = socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0xc850bd0a0d6796ef, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="00030e80493f1ec2cec9607e884730c863c4578ad7026b00210500cdc80093dd86dd00008848ba65000000019422ad6c688342b9c39e80aca4b1d8c40176ec09b4280452fd79867a825c07245004a3b19401b4e35eb9e68b058bdb54476eb18608147fdf79d1af8f4c56309ac9733d41cc0ff1c51d52575385598420abcc00"], 0x7ffff) 17:38:19 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x3000000}, 0x0) 17:38:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:19 executing program 4: socket$kcm(0x29, 0x8, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) recvmsg(r3, &(0x7f0000000940)={&(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000880), 0x0, &(0x7f00000008c0)=""/120, 0x78}, 0x42) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000380)=""/148, 0x94}, {&(0x7f00000000c0)=""/29, 0x1d}], 0x2, &(0x7f0000000440)=""/142, 0x8e}, 0x100) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x1, 0x9c5, 0x8, 0x9, 0x8, 0x1, 0x3, [], r4, r0, 0x4}, 0x3c) 17:38:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267013a00002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) socket$kcm(0x29, 0x2, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x9, 0x4, 0x7f5, 0x0, 0xffffffffffffffff, 0x400, 0x4, 0x7, 0x6, 0x4, 0xfffffffffffffff9, 0x1ff, 0x400, 0x7, 0x4, 0x6, 0x0, 0x0, 0x0, 0x7ff, 0x6, 0xc66, 0x10001, 0x2008000000000000, 0x0, 0xfffffffffffffffc, 0x8, 0x3, 0x6, 0x9, 0x9, 0x1, 0x6, 0x0, 0x6, 0x0, 0x2, 0x2, @perf_config_ext={0x1, 0x4a}, 0x23f80, 0x7fffffff, 0x60000, 0x3, 0x8, 0x100000001, 0x40}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='/dev/net/tun\x00') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:19 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x4000000}, 0x0) 17:38:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000080", 0x0, 0x103}, 0x28) [ 561.408621][T25453] device nr0 entered promiscuous mode 17:38:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r2, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r3, 0x0, 0x8}, 0xc) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r3, 0x1, 0x30}, 0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000006740)={&(0x7f0000005500)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000005700)=[{&(0x7f0000005580)=""/39, 0x27}, {&(0x7f00000055c0)=""/14, 0xe}, {&(0x7f0000005600)=""/169, 0xa9}, {&(0x7f00000056c0)=""/62, 0x3e}], 0x4, &(0x7f0000005740)=""/4096, 0x1000}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000006800)={0x0, 0xf, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x10001}, [@call={0x85, 0x0, 0x0, 0x37}, @initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x8000006}, @call={0x85, 0x0, 0x0, 0x3c}, @exit, @call={0x85, 0x0, 0x0, 0x1f}, @exit, @ldst={0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffff0, 0x8}, @map={0x18, 0x64a8afe1f974afb3, 0x1, 0x0, r4}, @map={0x18, 0x1a89e7c75d7336bd, 0x1, 0x0, r1}]}, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41100, 0x0, [], r5, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000006780)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000067c0)={0x4, 0x9, 0xadbe, 0x81}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a306000000f0", 0x0, 0x103}, 0x28) 17:38:20 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x5000000}, 0x0) 17:38:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair(0x4ca9a639d2ffa149, 0x5, 0x3f, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000580)={&(0x7f00000018c0)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x80, &(0x7f0000000300)=[{&(0x7f0000001940)="e003cad00d952fbe31a8e6ab84d1da17768ab681c876ed0c41307794ce4f6e419852ef065a48aff8169260bef479b2bbe411c3647fba91387c5303966b0612621494b62083dcbcf8aa83c9a09476430f9bba815c9b89903a7f6c6f191ca8697baa6070e57cf69fc810aa1c617dc0a5e762b464ac648222bf16d31e78e805", 0x7e}], 0x1, &(0x7f00000019c0)=[@txtime={{0x18, 0x1, 0x3d, 0x100}}, @mark={{0x14, 0x1, 0x24, 0x81}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x20000000}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0xac81}}, @mark={{0x14, 0x1, 0x24, 0x400}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @mark={{0x14}}], 0xd8}, 0x8000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 562.042717][T25485] device nr0 entered promiscuous mode 17:38:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x100000001) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x6d) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000a00)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:20 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x6000000}, 0x0) 17:38:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030200002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000002", 0x0, 0x103}, 0x28) 17:38:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xfffffffffffffffb) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, 'rdma'}, {0x2b, 'io'}, {0x2d, 'memory'}, {0x7b, 'memory'}, {0x16, 'io'}, {0x5a, 'pids'}]}, 0x24) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'ifb0\x00', 0x20}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x5002}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:20 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x0) 17:38:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000005", 0x0, 0x103}, 0x28) 17:38:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:20 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xa000000}, 0x0) 17:38:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030300002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) [ 562.564702][T25515] device nr0 entered promiscuous mode 17:38:21 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xe000000}, 0x0) [ 562.718430][T25528] validate_nla: 24 callbacks suppressed [ 562.718442][T25528] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 562.753012][T25528] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') getpid() write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) 17:38:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000060", 0x0, 0x103}, 0x28) 17:38:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030400002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:21 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xf000000}, 0x0) 17:38:21 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'ip\x00\x02\xe2\x00\b\xdf\xff\x00\b\xff\xff\xff\xff\x00', 0x5903}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) [ 563.062750][T25542] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 17:38:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x3}, 0x2f6) 17:38:21 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 563.124235][T25542] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 563.146130][T25552] device nr0 entered promiscuous mode 17:38:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a306000000f0", 0x0, 0x103}, 0x28) 17:38:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030600002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) [ 563.320825][T25564] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 17:38:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={r1, r2, 0xf}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) openat$cgroup(r3, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 563.371418][T25564] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a306000000a0", 0x0, 0x103}, 0x28) 17:38:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') r2 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = gettid() perf_event_open(&(0x7f0000003c80)={0x4, 0x70, 0x800, 0x227, 0x80000001, 0x1ff, 0x0, 0x45, 0x10000, 0x8, 0xffffffffffffffff, 0xffffffffffffff01, 0x8001, 0x80000000, 0x1c5a088e, 0x10000, 0xffffffffffff4c43, 0xda, 0x15f67a9e, 0x47, 0x10000, 0x513dbbe7, 0x1f, 0x20, 0x2, 0x6, 0x5, 0x4323, 0x7, 0x3fff800000, 0x10001, 0x0, 0x255679dd, 0x8bf2, 0x5, 0xf37c, 0x3, 0x400, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000980), 0xa}, 0x4000, 0x15b, 0x800, 0x3, 0xffffffffffffffc0, 0x9, 0xa8}, r3, 0x5, r2, 0x9) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) r5 = perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xfffffffffffffff8, 0x3, 0x1, 0x3, 0x0, 0x7d, 0x100, 0x15, 0x9, 0x9, 0x40, 0x5, 0x8000, 0x8, 0xeb, 0x368, 0x1, 0x3, 0x1, 0x8, 0x6, 0x5, 0x100000000, 0x7, 0x0, 0x5d, 0x9, 0x8, 0x6, 0x7a92, 0xfffffffffffffffc, 0x3, 0x80000, 0x6, 0x5, 0x5, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f0000000040), 0x87cbb48375da44f8}, 0x21120, 0x200, 0x9, 0x3, 0xff, 0x9, 0x400}, r3, 0xb, r4, 0xe) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000100)='\x00') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030a00002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:22 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x3f000000}, 0x0) 17:38:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) close(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="00696ff7e3f9a84c44f062202b61707520"], 0x9) r3 = socket$kcm(0x29, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x24, 0x6, &(0x7f00000000c0)=@raw=[@exit, @generic={0x6, 0x7, 0x820e, 0x0, 0x1}, @generic={0x7, 0x2, 0x2, 0x0, 0x800}, @exit, @ldst={0x0, 0x2, 0x2, 0x7, 0xa, 0x6, 0x1}, @call={0x85, 0x0, 0x0, 0x30}], &(0x7f0000000280)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41000, 0x4, [], 0x0, 0xd, r2, 0x8, &(0x7f00000002c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0xe, 0x8001, 0x2}, 0x10}, 0x70) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000400)={r0, r4}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:22 executing program 1: socket$kcm(0x29, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)=0xf3, 0x4) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="00030e80493f1ec2cec9607e8864c4578ad7026b00210500cd024093dd86dd00008848ba6558301f729422ad6c4f8342b9c39e80aca4b1d876ec09b4280452fd79867a3f5fa452060d297f94f4b3e35eb9e68b9a8894584e2559b4bb00dfd178514a941af96fe540551680107fdf79d1af8f4e56309ac9733d51cc0ff11999c3c3740f085a20"], 0x7ffff) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000140)={r2}) [ 563.906964][T25587] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 563.942093][T25587] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:22 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x40000000}, 0x0) [ 563.985703][T25596] device nr0 entered promiscuous mode 17:38:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030c00002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 564.160544][T25610] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 564.208739][T25610] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000080)={0x1, 0x0, [0x0]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:22 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x48000000}, 0x0) [ 564.601308][T25607] device nr0 entered promiscuous mode [ 564.688304][T25596] device nr0 entered promiscuous mode [ 564.843011][T25603] device nr0 entered promiscuous mode 17:38:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(r0, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) r3 = perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x300000, 0x8, 0x4, 0x0, 0xcbb, 0x10000, 0x4, 0x5b, 0x73, 0xfffffffffffff001, 0x3, 0x7, 0x9, 0x1, 0x7, 0x0, 0x3, 0x80000000, 0x5, 0xda000000, 0xef4a, 0x4, 0x3f, 0x0, 0x8, 0x5dbcbcff, 0x5, 0x6, 0x9, 0x1, 0x3, 0x80, 0x8, 0x6, 0x2, 0x0, 0x53, 0x5, @perf_bp={&(0x7f0000000080)}, 0x8000, 0x6, 0x9, 0x1, 0xbb, 0x80, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(r2, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000340)={'nr0\x00\x00\x00\x00\xee\x9f!\x13\x8b[\\\xc8\x00', 0x1002}) r5 = socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000580)={r1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r4, &(0x7f00000005c0)=ANY=[@ANYBLOB="00030e80493f1ec28ec9607e8847c4578ad7026b00210500cd0a0093dd86dd00008848ba6558301f729422ad6c688342b9c39e80aca4b1d8c40176ec09b4280452fd79867a3f5fa452060d297f9401b4e35eb9e68b9adfd178514a941af96fe540551680107fdf79d1af8f4e56309ac9733d41cc0ff11999c3c3740f085a20300aec1a"], 0x7ffff) 17:38:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:23 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x4c000000}, 0x0) 17:38:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000003c80)={0x4, 0x70, 0x800, 0x227, 0x80000001, 0x1ff, 0x0, 0x45, 0x10000, 0x8, 0xffffffffffffffff, 0xffffffffffffff01, 0x8001, 0x80000000, 0x1c5a088e, 0x10000, 0xffffffffffff4c43, 0xda, 0x15f67a9e, 0x47, 0x10000, 0x513dbbe7, 0x1f, 0x20, 0x2, 0x6, 0x5, 0x4323, 0x7, 0x3fff800000, 0x10001, 0x0, 0x255679dd, 0x8bf2, 0x5, 0xf37c, 0x3, 0x400, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000980), 0xa}, 0x4000, 0x15b, 0x800, 0x3, 0xffffffffffffffc0, 0x9, 0xa8}, r1, 0x5, r0, 0x9) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r3, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0xd5e1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000280)={0x5, 0xd, 0x10000, 0x8}, &(0x7f00000002c0)=0x8000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x6}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r1, r2, 0x0, 0xa, &(0x7f0000000080)=':vboxnet1\x00', r4}, 0x30) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r5, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030e00002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:23 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000040)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x80049) 17:38:23 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x60000000}, 0x0) 17:38:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030f00002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:23 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x68000000}, 0x0) [ 565.346307][T25653] device nr0 entered promiscuous mode 17:38:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:23 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x84001, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000040)={0x5bdb19fda588e8eb, 0x6, [@remote, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @dev={[], 0x20}, @local, @remote, @local]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x10000) 17:38:23 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x6c000000}, 0x0) 17:38:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a306000000a0", 0x0, 0x103}, 0x28) 17:38:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="00696f202b63067520"], 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000280)=""/134) [ 566.109751][T25658] device nr0 entered promiscuous mode 17:38:24 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'team_slave\x9c0\x00', 0x8000}) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x800, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000100)={'vxcan1\x00', @broadcast}) write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267031000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:24 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r3, 0xc0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={0x0, 0x3}, 0x0, 0x0, &(0x7f0000000840)={0x5, 0x7, 0xe438000000000000, 0x5}, &(0x7f0000000880), 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a00)=r4, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r2, 0x10, &(0x7f0000000100)={&(0x7f0000000040)=""/188, 0xbc, r4}}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:24 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x74000000}, 0x0) 17:38:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a306000000ff", 0x0, 0x103}, 0x28) 17:38:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00io +\a\x00\x00\x00'], 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x4, 0x7ff, 0x1, 0x1, 0x0, 0x2, 0x880a, 0xe, 0x351, 0x0, 0x1, 0x2, 0x3, 0x8, 0x7, 0x1, 0x1, 0x1f, 0x7ff, 0x2301, 0x0, 0x7f, 0x1, 0x7ff, 0x3615, 0x2, 0xfffffffffffffff8, 0x5, 0x3, 0xff, 0x0, 0x40c, 0x10001, 0x7fffffff, 0x6, 0x2, 0x0, 0x3f, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0xb000, 0x1000, 0xdf, 0x7, 0x2cf, 0x9, 0x6}, 0xffffffffffffffff, 0xe, r1, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 566.367404][T25715] device nr0 entered promiscuous mode 17:38:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2d, 'rdma'}, {0x2d, 'memory'}]}, 0xe) 17:38:24 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x7a000000}, 0x0) 17:38:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:24 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 17:38:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2b, 'cpu'}, {0x2d, 'rdma'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x0, 'memory'}]}, 0x21) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 566.968542][T25715] device nr0 entered promiscuous mode 17:38:25 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xb0000000}, 0x0) 17:38:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r2 = perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x3, 0xfffffffffffffffd, 0x8001, 0x0, 0x0, 0x3, 0x40000, 0x3, 0x4, 0x76c, 0x471d, 0x4, 0xffffffff, 0x7fff, 0x7, 0x7, 0x3, 0x0, 0x6, 0x6, 0x2, 0xffff, 0x2c72, 0x7, 0xfffffffffffffff9, 0x1, 0x1, 0x7, 0x0, 0x1, 0x20, 0x0, 0xc67, 0x3f, 0xfffffffffffffff7, 0x1, 0x0, 0x2be1, 0x1, @perf_bp={&(0x7f0000000080), 0x6}, 0x1, 0xfffffffffffffddf, 0xd, 0x0, 0x9, 0x81, 0x10001}, 0x0, 0x9, r1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000004c0)={0x7, 0x70, 0xf8, 0x9, 0x8001, 0x9, 0x0, 0xffffffff, 0x4c000, 0x12, 0x50, 0x7ff, 0x8, 0x7, 0xfffffffffffff5c1, 0x8, 0x1, 0x0, 0x4, 0x8, 0x8, 0x5, 0x0, 0x6, 0x8, 0xfffffffffffeffff, 0x4, 0x4, 0xa7, 0x7fff, 0x5, 0xfff, 0x40, 0x88, 0xfffffffffffffff8, 0x0, 0x8, 0x6dc01c48, 0x0, 0x1, 0x951d5ed3c551ac54, @perf_bp={&(0x7f00000000c0), 0xbf2be9f63366efe}, 0x79c2, 0x63e0, 0x8, 0x8, 0x8, 0x4, 0x8001}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0x19, 0x1000, &(0x7f0000000140)="0336a64e15c452e973779d7457e58d01a0cab33a49efeb83ce", &(0x7f0000000880)=""/4096, 0x967}, 0x28) 17:38:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267036000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:25 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)=0x7f, 0x4) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00 ', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) r3 = openat$cgroup(r2, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cpu.stat\x00', 0x2761, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r5, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r6, 0x0, 0x8}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r6, 0x4, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f00000001c0)='./file0\x00', r7}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) r8 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) r9 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) r10 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r10, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) r11 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) r12 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r12, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x100000000000007b}, 0x0) r13 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r13, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) r14 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r14, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) r15 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r15, 0x4030582a, &(0x7f0000000000)) r16 = socket$kcm(0x11, 0x2, 0x300) recvmsg(r16, &(0x7f0000007700)={&(0x7f00000073c0)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001b00)={0x6, 0x1, &(0x7f0000001a00)=@raw=[@generic], &(0x7f0000001a40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, [], r17, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$TUNSETIFINDEX(r15, 0x400454da, &(0x7f00000000c0)=r17) write$cgroup_subtree(r4, &(0x7f00000005c0)=ANY=[@ANYPTR64=&(0x7f0000000580)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32=r13, @ANYRES64=r14, @ANYPTR, @ANYPTR, @ANYRESOCT, @ANYPTR, @ANYRESOCT, @ANYPTR64=&(0x7f0000000600)=ANY=[]], @ANYRESDEC=0x0, @ANYRES32]], 0xfffffd95) 17:38:25 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 17:38:25 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000003c80)={0x4, 0x70, 0x800, 0x227, 0x80000001, 0x1ff, 0x0, 0x45, 0x10000, 0x8, 0xffffffffffffffff, 0xffffffffffffff01, 0x8001, 0x80000000, 0x1c5a088e, 0x10000, 0xffffffffffff4c43, 0xda, 0x15f67a9e, 0x47, 0x10000, 0x513dbbe7, 0x1f, 0x20, 0x2, 0x6, 0x5, 0x4323, 0x7, 0x3fff800000, 0x10001, 0x0, 0x255679dd, 0x8bf2, 0x5, 0xf37c, 0x3, 0x400, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000980), 0xa}, 0x4000, 0x15b, 0x800, 0x3, 0xffffffffffffffc0, 0x9, 0xa8}, r1, 0x5, r0, 0x9) r2 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0xffffffffbf9e5d95, 0x4, 0x3, 0x0, 0x5d, 0x8004, 0xd, 0x5, 0x5e0, 0x2, 0x8, 0x26, 0xffffffffffffff01, 0x3, 0x1ff, 0x97, 0x20002000, 0x3790000000000000, 0xfff, 0x6, 0xffff, 0x10001, 0x964, 0xffff, 0x3, 0x7, 0x4, 0x0, 0x7, 0x1, 0x7fffffff, 0xffffffffffffff96, 0x2, 0x5, 0x8, 0x0, 0x1ff, 0x5, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0xfffffffffffffffb, 0x1d, 0x6, 0x6, 0x8000, 0x8af}, r1, 0x4, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x18228, 0x0, 0x6, 0x0, 0x10000000}, 0x0, 0x1, r2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x0, 'io'}, {0x2b, 'memory'}]}, 0xffffffffffffff00) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r3, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) r5 = socket$kcm(0x11, 0x2, 0x300) recvmsg(r5, &(0x7f0000007700)={&(0x7f00000073c0)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001b00)={0x6, 0x1, &(0x7f0000001a00)=@raw=[@generic], &(0x7f0000001a40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, [], r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x2, 0x9, 0x2, 0x1, 0xffffffffffffffff, 0x7, [], r6, r4, 0x2, 0x2}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r7, 0x0, 0x2, &(0x7f00000000c0)='io'}, 0x30) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x7a5e) 17:38:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 567.278929][T25770] device nr0 entered promiscuous mode [ 567.320121][T25776] device nr0 entered promiscuous mode 17:38:25 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 17:38:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a65526703f000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:25 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 17:38:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 567.683766][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 567.689608][ C0] protocol 88fb is buggy, dev hsr_slave_1 17:38:26 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 17:38:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 567.806408][T25803] validate_nla: 24 callbacks suppressed [ 567.806418][T25803] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 567.847179][T25803] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000280)={0x5, 0x70, 0x400, 0x1f, 0x5, 0x2, 0x0, 0x3, 0x62010, 0x4, 0xf2e4, 0x5, 0x7, 0x9, 0x4, 0x6, 0x33bb, 0x1, 0x7, 0x40000000000, 0x7, 0x7, 0x7, 0x1, 0xb6d5, 0x1ff, 0x200, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x9, 0x3, 0x6, 0x9, 0xc1, 0x200, 0x0, 0x1f, 0x2, @perf_bp={&(0x7f0000000080)}, 0x2, 0x3, 0x7f, 0x8, 0xba, 0x100, 0x20}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:26 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) [ 568.109880][T25825] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 568.153799][T25825] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 568.378876][T25828] device nr0 entered promiscuous mode 17:38:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) r1 = getpid() r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) r4 = perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x70, 0x7, 0x2, 0x1, 0x7ff, 0x0, 0x1000, 0x296f2f6beeebf7a4, 0x0, 0x1, 0x400, 0xdf2b, 0xfffffffffffffffa, 0x8, 0x7, 0x7, 0x0, 0xe736, 0xcad, 0x4, 0x4, 0x2, 0xfb, 0x36, 0x3, 0xfe74, 0x9, 0x8, 0x5, 0x10000, 0x3000000000000000, 0x1, 0xfffffffffffff397, 0x2, 0x3ece, 0x1f, 0x1c5, 0x0, 0x7f, 0x1, @perf_config_ext={0x8, 0x6}, 0x1002, 0x1000, 0x8, 0x5, 0x1, 0x8, 0x80000001}, r2, 0x4, r3, 0x1) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x2, 0x3, 0x2, 0x22, 0x0, 0x4, 0xbc120, 0x4, 0x3, 0x10000, 0x80000000, 0x1, 0x3, 0xbf, 0xfffffffffffffffb, 0x401, 0x7fffffff, 0x9, 0xb0, 0x8, 0x0, 0x1000, 0x800, 0x2, 0x10001, 0x9, 0x1a0be00, 0x8, 0x8, 0x7d8e, 0x1, 0x4, 0x1, 0x5, 0xddd, 0x20, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0x1}, 0x7208, 0x7, 0x1, 0x7, 0x6f, 0xffffffffffff0001, 0x4000000}, r1, 0x6, r4, 0x1) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f00000001c0)='./file0\x00', 0x1}, 0x10) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000180)=0x9, 0x4) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:26 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='=\x97:tI!S\t\x00\x17\xc6n\x00', 0x1516c0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f00000000c0)=0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0x0) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={r3}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'sit0\x00', 0x200}) 17:38:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030003002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:26 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = gettid() perf_event_open(&(0x7f0000003c80)={0x4, 0x70, 0x800, 0x227, 0x80000001, 0x1ff, 0x0, 0x45, 0x10000, 0x8, 0xffffffffffffffff, 0xffffffffffffff01, 0x8001, 0x80000000, 0x1c5a088e, 0x10000, 0xffffffffffff4c43, 0xda, 0x15f67a9e, 0x47, 0x10000, 0x513dbbe7, 0x1f, 0x20, 0x2, 0x6, 0x5, 0x4323, 0x7, 0x3fff800000, 0x10001, 0x0, 0x255679dd, 0x8bf2, 0x5, 0xf37c, 0x3, 0x400, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000980), 0xa}, 0x4000, 0x15b, 0x800, 0x3, 0xffffffffffffffc0, 0x9, 0xa8}, r3, 0x5, r2, 0x9) r4 = perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x1, 0x8, 0x10000, 0x1, 0x0, 0x5, 0x80000, 0x5, 0xc843, 0x9, 0x8, 0x6, 0x1, 0x0, 0xffffffff80000000, 0xb250, 0x8, 0x4, 0x7, 0x7fff, 0x44a, 0x2328953c, 0x1, 0xab9, 0xfff, 0xffffffffffffffff, 0x8000, 0x6, 0x36d9f05e, 0x8, 0x3ff, 0x7ff, 0x3, 0x6, 0x800, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000140)}, 0x14808, 0x1, 0x3f, 0x3, 0x6, 0x3, 0x3}, r3, 0x8, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x1, 0xe04a, 0x8000, 0x2, 0x0, 0xc1, 0x4, 0x2, 0xfffffffffffffffc, 0x1, 0x80000001, 0x0, 0x0, 0x10000, 0x5, 0x3f, 0x5, 0x6, 0x3ff, 0x800000, 0x1, 0x65, 0x5, 0x0, 0x6, 0x9, 0x7fffffff, 0x0, 0x7ff, 0x200, 0x1, 0x0, 0xfffffffffffffffb, 0x2, 0x6, 0xffffffffffff7fff, 0x0, 0x3, 0x1, @perf_config_ext={0xffffffff9a634b28, 0x1f}, 0x24142, 0x2, 0x10000, 0x6, 0x893, 0x7, 0x7ff}, r1, 0x1, r4, 0x6912d721f9e4d076) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x0, 'memory'}, {0x2d, 'cpu'}]}, 0xd) perf_event_open(&(0x7f0000000180)={0x1, 0x3ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r6, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:26 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x3000000000000}, 0x0) [ 568.599196][T25839] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 568.623858][T25839] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="00696f202b6370752096d60141e76cd4c00fa113d40c780ab3b0733fda3cd189f71b5277e2b6e33a29a733f82805db33cf8a138523d2fae208a439cf7f41314abd7bef0e3ac281237838dff8dec65c1c6e08b3a27fadc7ab0ce57a9fa24b7f4cc684d57ad9671ca09f1a4928df6916671d18a44501672fabc63340f20ac3aa6b8368736ebe97622bf174a1b15da35991073916317b25507f80c4876ee9afbe4c0c6413cc5c04a8018b1b9852b6af6ad648c876ffedf40a53c18c309a5e9c3313ab485f4ec7e62b93688e7986ad0edfde9e0b717e82534730000000362767d360ee79d742b81bafe9ba"], 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 568.664915][T25848] device nr0 entered promiscuous mode 17:38:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x40030000000000}, 0x0) [ 568.797119][T25858] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 568.851782][T25858] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a306000000ff", 0x0, 0x103}, 0x28) 17:38:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) openat$cgroup(r1, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) 17:38:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xf0ffffffffffff}, 0x0) [ 568.989610][T25867] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 569.023798][T25867] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 569.265800][T25848] device nr0 entered promiscuous mode 17:38:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0xfff, 0x3, 0x6, 0x7ad, 0x0, 0x100000001, 0x68000, 0x8, 0x80000001, 0x6, 0x0, 0x1, 0x40, 0x7fff, 0xcd, 0x2, 0x7, 0x2, 0x1ff, 0x6, 0xfffffffffffff655, 0x1, 0x10001, 0x4, 0x44d2c3e1, 0x7, 0x2, 0x2c6, 0x2, 0x586, 0x10001, 0x1, 0xdc, 0x0, 0x4, 0xfffffffffffffffe, 0x0, 0x7, 0x7, @perf_config_ext={0x1, 0x2}, 0x200, 0x2, 0x0, 0x0, 0x5, 0x7f, 0x1}, 0xffffffffffffffff, 0xb, r1, 0x2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'ip6gretap0\x00', 0xdb86ef1916ca4fc4}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x7, 0xda, 0xa65, 0x3, 0x0, 0xfffffffffffffffb, 0x2001, 0x1, 0x3f, 0x1f, 0x1, 0x2, 0x40e, 0x200, 0x40, 0x800, 0x2, 0x7, 0x401, 0x2, 0x1, 0x7, 0x4, 0x5, 0x3, 0x200, 0x3, 0x4, 0x6848, 0xffff, 0x8, 0x2, 0x81, 0x5, 0x401, 0x0, 0x0, 0x8001, 0xee7411109c80e081, @perf_bp={&(0x7f0000000040), 0x8}, 0xa7776feb6bf71693, 0x100000000, 0x6, 0x8, 0xc89, 0x2, 0x6}, 0xffffffffffffffff, 0x10, r3, 0x2) socket$kcm(0x2, 0x0, 0x84) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x2, 0x5, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0xd, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4000000) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="00030e80493f1ec2cec9607e8864c4578ad7026b00210500cd020093dd86dd00008848ba6558301f729422ad6c688342b9c39e80aca4b1d8c40176ec09b428f451fd79867a3f5fa452060d297f9401b4e35eb9e68b9a61cac03fc9809acbb2dfd178514a941af96fe540551680107fdf59d1af8f4e56309ac9733d41cc0ff18d6eb478f35f4c0002df798960f84956cdf59c4102457c887785277cb0bf2a3d1b4aa05221b11583516d52dfed31eea16ca3a3a5992a630ea68f70a90645cd84c22a70984db3b444fe89cfbfbe488601ec6d43f26d66e76e2291481a6973"], 0x7ffff) 17:38:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00io\x00\x00ceu '], 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) 17:38:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a65526703bd03002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:27 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'rdmaGP.,\xef\xc1\xaa\x7f\x11\xbe\xc01bb\nO\x04\xf1c\xfa\xcf#\xcf\xfe\xd4\xfb\xdb\xc7\x15\xd7\xba\x84\tO\x1dYl\x89-\xf7\xf3U\xcb\x17\xd3\x86\xb2\xa4b|\x80\xf3\xe7_\xbf\xd6>l\x9a\xbf?[G\xcd\xfc\xcf\xa5\xec\xfajIs\xce\xf1\x9e\x03\x0e\xb1*PX\x93\x02\x8a\n\xc5 C\xe9!~\x01F\a\xd0gs\xcb\xce\x04\xa9\xb3}^\xddMo\xf9.\xfaF\x9120\xe5\xa1k\x8dU\xc2\xdc\xdf!u8\xc5ij\xc5\x84\xf2\bCV'}]}, 0x8c) [ 569.522379][T25887] device nr0 entered promiscuous mode 17:38:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) 17:38:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a306000000fe", 0x0, 0x103}, 0x28) 17:38:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00io +cpv '], 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x300000000000000}, 0x0) 17:38:28 executing program 4: perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x100, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000fc0)={&(0x7f0000000b80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000c00)=""/245, 0xf5}, {&(0x7f0000000d00)=""/9, 0x9}, {&(0x7f0000000d40)=""/114, 0x72}, {&(0x7f0000000dc0)=""/252, 0xfc}], 0x4, &(0x7f0000000f00)=""/164, 0xa4}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x12, 0x7, &(0x7f0000000080)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x4}, @alu={0x7, 0x4, 0x0, 0x7, 0x0, 0xc, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3ff}, @call={0x85, 0x0, 0x0, 0x13}, @alu={0x4, 0x6, 0xb, 0xa, 0xb, 0x2, 0x4}], &(0x7f00000001c0)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x7, [], r3, 0x28, r1, 0x8, &(0x7f0000001000)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001040)={0x5, 0x7, 0x100000000, 0xf20}, 0x10}, 0x70) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x6, 0x11e, 0xffff, 0x1ff, 0x0, 0x1, 0x400, 0x2, 0x2, 0x256, 0x2, 0x9, 0x17, 0x9, 0x3, 0x5, 0x5, 0x3, 0x3, 0x8, 0x7, 0xffff, 0x2, 0x6, 0x7fffffff, 0x20, 0x5, 0x81, 0x1, 0x1, 0x7fff, 0x7be3b98b, 0x1, 0x4, 0x67, 0xfffffffffffffffe, 0x0, 0x3, 0x2, @perf_config_ext={0x3, 0x8000}, 0x21400, 0xb82, 0x0, 0x8, 0x14e1, 0x1, 0x6}, r1, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="a95c0aac0dce71775446cf4f0b866976ce023234024661747fdab2d996fe28c6b7d0ae304e313676f377f82372cb848763c6881fd2a89febd50ef515618d05cb2ef8d5e34114df59f19f7f807742e42260f4356089bc32ccd303799289b2921ebc8945dd175f1f7cb1a3724f21b9d434a2b3cefb3ae34ab46eaa667ca0a2fdb9d286f9ddef58206c8f6f92a67f04a1397bc2d4e08ec24503e80d3621b72f176aeab93ae36b74bb6cb1897450d0f9808c016c07d4fcc7563e83eed29536bb4e3a981413c7633959ae517780078bdb84954503c986498af06921312e5ec6aa2ed819d1adba850000000000"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) sendmsg(r4, &(0x7f0000000a40)={&(0x7f0000000500)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x4}, [@null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000740)="04afa9af453f0d3edbaac7b0c8d7cc6d38921794b57f48c3a23faa0be08231df1a855d6c5210f6d8b317729894175adc6b1a6d09eb1cd3f8409722ab0a586162cf1e2f6a25f6", 0x46}, {&(0x7f0000001100)="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", 0x1000}, {&(0x7f0000000580)="c759234c5391c9ec88530ea60aa01abd84d3b3ac65c3f32b9d98d1618d926812fdc73752ad3d70b13914c441f05517ee5172390d221b", 0x36}, {&(0x7f00000007c0)="0cfa9f05055f1e076ab544ce658ee0e5597629a0b92942443f2a2b3c1bf242925cb89bd49b83fb41e3e9bd17028ce3747aa8f37ec82daae093645e7373e208615116eca5267e3d4026187df39456f3253b320b7a99ae8d63bc0f10ed9a4526a94281797cdbfeda37f55fa4d47db2332b56e466516b85a53adf03718bd1103a626b96a14265855c5a19", 0x89}, {&(0x7f0000000880)="6f0e43817e1f0ef07022f37ac4b461b54b51f79299cc9dacbe2f51382e604ef1c482a18db6dd5cb03b0d567dd661f1fc9116d32799ba60fde56a80b3f369bd3dac30fa2aa148c14aa9e2d3583965768b9d5f20ba5f8e26f09c532f6ba25b3bcc74abb85991394708bfce9cd424ac869fcb64ebfacf478d20e32e31b380e559764f032020e6f4ba61e431c33f16e7a0bf9f3a8fc4ef0ef7e79aaa8792bb99a3f18be42a4e6bf993ade0892a15326509c6c740811c681127dba848524af4148c31aa091498bb57deff4b6b72338662a7", 0xcf}], 0x5, &(0x7f0000000a00)}, 0x40000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x400000000000000}, 0x0) [ 570.159709][T25913] device nr0 entered promiscuous mode [ 570.260586][T25887] device nr0 entered promiscuous mode [ 570.435764][T25899] device nr0 entered promiscuous mode 17:38:28 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00\x04\x18e\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x410000, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) r5 = perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x20, 0x5e65755c, 0x10000, 0x0, 0x7, 0x80, 0x4, 0x2, 0x4cd, 0xfffffffffffffff8, 0x7500000000000000, 0x101, 0x8000, 0x0, 0x9, 0x100000001, 0x6, 0x74fd, 0x4, 0x8, 0x100, 0x800000000000, 0xfffffffffffffffd, 0x5, 0x7fffffff, 0x80000000, 0x4ffe80ac0000, 0x2, 0x8, 0x8000, 0x8, 0xd1, 0x5, 0x100000000, 0x4, 0x0, 0x5, 0x8, @perf_config_ext={0x8, 0x6e}, 0x2000, 0x20, 0xfffffffffffffffc, 0x0, 0x8001, 0x5, 0x6}, r4, 0xa, 0xffffffffffffffff, 0x5) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x8, 0x9, 0xb7c4, 0x796, 0x0, 0x6, 0x40001, 0xc, 0x5, 0x8034, 0x7f, 0x7ff, 0xf46, 0x20, 0x5ef, 0x6, 0x101, 0x2, 0x3, 0x7, 0x81, 0x8, 0x7ff, 0x7fffffff, 0x5, 0x6, 0x8, 0xfffffffffffffffc, 0x2000000000000000, 0x4, 0x4, 0x3f, 0x400, 0x7ff, 0xf0c4, 0x5, 0x0, 0x6, 0x5bb1d8c0042d77aa, @perf_bp={&(0x7f0000000080), 0x2}, 0x800, 0x3ff, 0x4, 0x7, 0x0, 0x5, 0x3}, r3, 0x9, r5, 0x4) 17:38:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a306000000ff", 0x0, 0x103}, 0x28) 17:38:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x500000000000000}, 0x0) 17:38:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="00696f012b637071205714567bd2f4fb6a972b5fae8203c56a0329ef7c4b0423e8"], 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030006002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:28 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x600000000000000}, 0x0) [ 570.655226][T25941] device nr0 entered promiscuous mode 17:38:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) write$cgroup_subtree(r1, &(0x7f00000000c0), 0xfffffffffffffeb3) 17:38:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a306000000ff", 0x0, 0x103}, 0x28) 17:38:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x700000000000000}, 0x0) 17:38:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a65526703000a002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:29 executing program 4: getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 571.255796][T25957] device nr0 entered promiscuous mode [ 571.342427][T25983] device nr0 entered promiscuous mode [ 571.548883][T25954] device nr0 entered promiscuous mode 17:38:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={r2, &(0x7f0000000040)="ec9a25396e01114c425d3b264c31072a9be48d50fc73b5e075320abdf72d762c44d2ab0fa0", &(0x7f0000000080)=""/237}, 0x18) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="00030e00493f1ec2cec9607e8864c4578ad7026b00210500cd020093dd86dd00008848ba6558301f729422ad6c8343b9a09e80aca4b1d8c43f5fa452060d297f9401b4e35eb9e68b9adfd178514a941af96fe540551680107fdf79d1af8f4e56309ac9733d41cc0ff119998fecdb7365c3c3740f085a2000"], 0x7ffff) 17:38:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xa00000000000000}, 0x0) 17:38:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a306000000ff", 0x0, 0x103}, 0x28) 17:38:30 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) 17:38:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a65526703000c002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)={r3}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xe00000000000000}, 0x0) [ 571.789545][T25989] device nr0 entered promiscuous mode 17:38:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a65526703000e002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x401) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000100)=@generic={0x11, "1b8603476dbd78410f56cbbc6608a14995ee23fe848d5cc428f5143446036874b0f5ea2000e6261c447bb3b8021b51bdfae929f93a70fbb466b46cd089253a4b91a3156d2fbf91a6b2effa64df28cff58ec7ba52e9da4fb8923b42107fa849ac0abf06df5c82119464d548cb99099af5748acad63075f07e1836120ba5e8"}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)="087121811b1a542c174c5a08404f49f67a8399e465d51a52d61c10d64a39301f12174271259d3e616fdbb540cbe628c4597cce8a0ed83cea587a3bcc10b75fd5314707e2c463e7883af3ac0a19dce8aa92202b69eff1c92fd0b69b66f37fb3aa2bd28f0449bb29cd70039aa9cdde2454c335fb7b073d274e7e2416", 0x7b}, {&(0x7f0000000480)="074f1ebaf703e8c62c5934aa115594acf29786a7d98bae72baecfb0d5b668c73bdc3dc2dc72040b7e00bb1dd4ce76e604beffd6940867bad6bee8acd42d608be9fee7f288d7a9989dfb3e9ef39ea650c95ae3c55be3355efdd35e72f24ce876fc54b154f236eaccc2a756825e34ec17ccce36e2d8dd072f6c83cca21501d8375556afe62727dfbaff18a97e9cdaf2a4c387108494cda9152f812aa675431d1017e35a104de", 0xa5}, {&(0x7f0000000080)="b43e16700cd476770e1bab439a053ecdabab01216be543a4", 0x18}], 0x3, &(0x7f0000000740)=[{0x50, 0x0, 0x5, "ab29b66f9291048491f6464330adb6dc34a1cd8dd36eb1a473136f058aca25cbe38bdefb735b61d1825bf0496ceb5af06862bcc995e11f2d7a9a17b52e966904"}, {0x78, 0x1, 0x6, "a43509828cdd4b7ff1f6203af67e0d526085e49f41dbafe0101e3211cf7094b9754d204758ce02740f20a41e00e718a061a5419b5394f9e13b4e9c32b6f1ec8c3d254e569cd25106ec0fdd1cfaceff43acba999cf0d06d647592c3d0a2abe797a2e05fbc6c8e"}, {0x50, 0x797cb0ed4527bba5, 0x10001, "e5730d186c9f4ea46e5e26e3b01bc113bd231940cd62a6a0c8dbf38d814d5df2d23649bf99bcd01f7b549654f65bc4bebebab9df357ded772d542f691415"}, {0x70, 0x99, 0x3f, "317704b2869fac4b725b7c07bf1c83eac40756079509492ec1dca7dbfc151cbbfe0e8b9ed2f71f9952b848a09bbc4f8b802311b0a93b53d7020da9d2351400fc082a5b53f12b6e4d2d6ffc2f96f628689c8941665f6eff1c90569b3a"}, {0xf0, 0x20a, 0x40, "1a7bee56c7af2366b2e5719fe98b6d5729b9d9b2b99759f868f266fef8839685f5867c71fd98b6a7f7565ce121396ff097c3ec9f77ad923d0853fcb949a6655624dacf5780dc344e81bc7bccb75b1f7732e9f7b0c36304b14da88826d67c9efc5ffb31e26ab6358c16a0bdb885e5d11f43ea00627f6bc3eaa20d7c36ab18eb1b04fec7263250e09895283fd6ae386ecf17cf212a91493cefd23a85ce65ce3ac1518c18f2a55e1cc2d038901e0120650b35c85022fd6cd84cb3af728d2bd6a95125a311c5cb4553dab385df61e5ff5e570d3732cc4e36a548ea7e"}, {0x38, 0x30d905998213926a, 0x280000000000000, "d96337c3b53b0a3ae5da73dd04a75b7b661e33ad2b0716acd72330aa994f2e18144a6458a92e"}, {0xb8, 0x0, 0x37c0000000, "99fdd77cbe351f7ee7c219e5d5b37158f419be8c0302d9ddf7e237f882a7366c00544a3f612c7c61ec98f4ea0c0ac70cdaeec5653e3d7a30fcc27887e27b9eb71a538ed5681e7535d511b9a1849eae7536b39999ca5e3edd9d0452255c8404334b48b574cb2a81a343de272f78fa0c339d99fc3f6fae13b5d1b38fc60ba340ac76fddddc2d3eb3d146535df912ec7b53300b6f029d4419993f0250eff91af82adad23fe1"}, {0x10, 0x112, 0x7}], 0x378}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x0, 0xcd, 0xff87, &(0x7f0000000380)="3a251563d579f0070000ec000000002bc1030adb80e0e0338c41080a30d95385de28c7090bb73d8c41dbb90f36ddbe7e4f08d6c9c12eecca8a5a28d6b2de24c49af0c39f2cd5ea8b3082c2cda70e6d9fb2903003d9af4b18da80b8fe822122b8e2c56f5ca5b833bbd33d891482e048257ce98797b4b0eac31e8348aa7f13c09a54144824eb7cbfb135fef256a78e431deaedceb8efeb708d5cf77e1f10770748eadf320b55530cfcf0ac1363bc6edc29573239295d492ea36fd633c7b2122ab246cd547a84aa744ef343cd9934", 0x0, 0x103}, 0x28) 17:38:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 571.862185][T26002] device nr0 entered promiscuous mode 17:38:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xf00000000000000}, 0x0) 17:38:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x2000000000000000}, 0x0) [ 572.435168][T25989] device nr0 entered promiscuous mode [ 572.562543][T26002] device nr0 entered promiscuous mode 17:38:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="00030e80493f1ec2cec9607e8864c4578ad7026b00210500cd020093dd86dd002702d954ae85edf6729422ad6c688342b9c39e80aca4b1d8c40176ec09b4280452fd79867a3f5fa452060d297f9401b4e35eb9e68b9adfd178514a941af96fe540551680107fdf79d1af8f4ef07cb02a733d41cc0ff11999c3c3740f085a203c497df5b2aeb7eb1558f3b94974320b078267502d0caafd296f61b0c543d0ae4d2fd96bd2196658d826a749e7a1eb0e488a8b5b3677924c6a2620d66d0bcbe8bd13471859"], 0x7ffff) 17:38:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x8, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:31 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x3f00000000000000}, 0x0) 17:38:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a65526703c00e002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = gettid() perf_event_open(&(0x7f0000003c80)={0x4, 0x70, 0x800, 0x227, 0x80000001, 0x1ff, 0x0, 0x45, 0x10000, 0x8, 0xffffffffffffffff, 0xffffffffffffff01, 0x8001, 0x80000000, 0x1c5a088e, 0x10000, 0xffffffffffff4c43, 0xda, 0x15f67a9e, 0x47, 0x10000, 0x513dbbe7, 0x1f, 0x20, 0x2, 0x6, 0x5, 0x4323, 0x7, 0x3fff800000, 0x10001, 0x0, 0x255679dd, 0x8bf2, 0x5, 0xf37c, 0x3, 0x400, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000980), 0xa}, 0x4000, 0x15b, 0x800, 0x3, 0xffffffffffffffc0, 0x9, 0xa8}, r4, 0x5, r3, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001840)={0xffffffffffffffff, 0xc0, &(0x7f0000002c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=0xcb86, 0x0, 0x0, 0x0, &(0x7f0000001740)={0x2, 0x1}, 0x0, 0x0, &(0x7f0000001780)={0x3, 0x5, 0x5, 0x1}, &(0x7f00000017c0)=0x203, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=0x1}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0x0, 0xffffffffffffffff, 0x0, 0x2c6, &(0x7f0000002cc0)='\'\xbd\xd9\xea\xb8\xc2\x06\xc6\b\xbb\xbd\x06\xbc\xbc\x9e\xa6uj\x97\xde\xc6{\xee\a=o\xbf\x7f\xecr\xd8\xfe!+\xdee+BJ\x8d\xa3\xbd\x93\xffK\xce\xad\a\x9e\xf4;\xc8v\a\x858g\xfd6\xdar\xc9GVN\xcecMCxSy\x1d\xf8\xd1b\'P\xd5\xf3\x1c=\r0\xe8),E\xb78[\xe0\xf8\xac\xb2\x9b\xdc\xe1x\xd1\xcdkY\x9e\x85E\xb6\v~\x1a+\x13P\xd4-EA\xa1E\xe9rI\x1d\xac\x1d7{\xdc\t\xb3\xce\xa8N\xf6\x820C\x10\x81\xe8E>\x1c\x19\xe5\xa3aO\b\xfe\x1b\xb3\x10\xbe\x13\x9eI{\xc4\r\xb4+,g\xe8\xa7\xa7b0s\xf2\x11\xbc\xa5\x0fW\xde\xd9\bJ%\xdd[\x85B\xd6Lw\x03\x143\xafN\ni\x88\xd5\xda\x01P\xfa^\xe3_\x87/\xff\x9b\r\bF\xdb%\xa1:.!b\x98\xf3\x1a\x04\x96\xf9\xd1\x1e)F\xe7/\xf6\x90\xbad\x83\xd0D\xb1{\x1fB\xca\x00\x85\x1aO\x19\xae\xddY\x98\x1f\xee\x99\x04:\x9c\x0f\xc3j|\xb2\x10]6\xb43\x9b)\xe8 \x15\xc3B\xeb\x00-\xc7\xa3\xa3\xbc_\x8eobI\xca\xf8A\x17\xd7 \x81\x1aY\xe8\xb8\xab', r5}, 0xfffffffffffffff4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000140)='/dev/net/tun\x00', r5}, 0x30) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETTXFILTER(r8, 0x400454d1, &(0x7f0000000600)={0x0, 0x2, [@dev={[], 0xb}, @empty]}) r9 = perf_event_open$cgroup(&(0x7f0000000580)={0x1, 0x70, 0x4, 0xfffffffffffffffd, 0x3, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x14, 0x6, 0x20, 0x3, 0x8, 0x1, 0xffffffff, 0x3, 0x50000000, 0xd046, 0x9, 0x8, 0x5, 0x9, 0xfffffffffffffffd, 0x1, 0x4800000, 0x17, 0x3, 0x81, 0x9, 0x0, 0x7fff, 0x2, 0x5, 0x9, 0x1, 0x800, 0x6, 0x0, 0x7fff, 0x6, @perf_bp={&(0x7f00000001c0), 0xa}, 0x8000, 0x7, 0x40, 0x4, 0x6, 0x0, 0x57f}, r7, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x100, 0x6, 0x7f, 0xffff, 0x0, 0x2, 0x0, 0x8, 0x7f, 0x1a6d8000000000, 0x2, 0xcf, 0x7, 0x1, 0x5, 0x7f, 0x14b, 0x4, 0x1d, 0x2, 0x6, 0x6, 0x45, 0x0, 0x361, 0x97d, 0x8001, 0x32b, 0x6, 0x2, 0x7fff, 0x8, 0x6d1, 0x7, 0x1, 0x0, 0x0, 0x6, 0xa, @perf_bp={&(0x7f0000000080), 0x6}, 0x8, 0x2, 0x0, 0x0, 0x56, 0x1, 0xffff}, r6, 0x1, r9, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='/dev/net/tun\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) [ 572.834797][T26030] validate_nla: 22 callbacks suppressed [ 572.834807][T26030] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 17:38:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'cpu'}, {0x2d, 'pids'}, {0x2d, 'rdma'}, {0x2b, 'rdma'}, {0x2d, 'rdma'}]}, 0x1d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 572.895116][T26030] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 572.927791][T26043] device nr0 entered promiscuous mode 17:38:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 572.948059][T26044] device nr0 entered promiscuous mode 17:38:31 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x4000000000000000}, 0x0) 17:38:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a65526703000f002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 573.110275][T26058] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 17:38:31 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg(r0, &(0x7f0000007700)={&(0x7f00000073c0)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001b00)={0x6, 0x1, &(0x7f0000001a00)=@raw=[@generic], &(0x7f0000001a40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x108, 0x108, 0x5, [@union={0x1, 0x1, 0x0, 0x5, 0x81b5, 0x78, [{0x0, 0x5, 0x1}]}, @enum={0x4, 0x7, 0x0, 0x6, 0x4, [{0x5, 0x3}, {0xa, 0x40}, {0x8, 0x8}, {0x6, 0x9}, {0xa, 0x7c932755}, {0x2, 0x10001}, {0x9, 0x4}]}, @func={0xf, 0x0, 0x0, 0xc, 0x3}, @ptr={0x3, 0x0, 0x0, 0x2, 0x5}, @enum={0x7, 0x5, 0x0, 0x6, 0x4, [{0xc, 0x4}, {0x10, 0xb84a}, {0x1, 0x3}, {0xd}, {0xa, 0x7}]}, @union={0x4, 0x7, 0x0, 0x5, 0x10001, 0x3, [{0x1, 0x4, 0x401}, {0x6, 0x4, 0x9}, {0x1, 0x1, 0x5}, {0x6, 0x0, 0x5}, {0x5, 0x2, 0x6}, {0x4, 0x1, 0x6}, {0x9, 0x4, 0xffffffffffffffe1}]}]}, {0x0, [0x61, 0x0, 0x61]}}, &(0x7f0000000280)=""/135, 0x125, 0x87, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x13, 0x6, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x3f}, @call={0x85, 0x0, 0x0, 0x2e}, @exit]}, &(0x7f00000000c0)='syzkaller\x00', 0x9, 0x0, 0x0, 0x23680, 0x4, [], r1, 0x6, r2, 0x8, &(0x7f00000004c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x4, 0x7, 0xffff}, 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r3, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 573.202358][T26058] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 573.353804][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 573.359644][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 573.433828][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 573.439634][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 573.576158][T26043] device nr0 entered promiscuous mode [ 573.805717][T26049] device nr0 entered promiscuous mode 17:38:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x14}, 0x10) openat$cgroup_ro(r1, &(0x7f0000000140)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000340)={'!\xe9\x8f\x00\x00\x00\x00\x00\x00 \x00', 0x1002}) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="2b7209000085"], 0x6) 17:38:32 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x4800000000000000}, 0x0) 17:38:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030040002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) [ 573.913744][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 573.919583][ C0] protocol 88fb is buggy, dev hsr_slave_1 17:38:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) recvmsg$kcm(r1, &(0x7f0000000300)={&(0x7f0000000040)=@tipc=@id, 0x80, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/82, 0x52}, {&(0x7f0000000140)=""/19, 0x13}, {&(0x7f0000000180)=""/113, 0x71}, {&(0x7f0000000280)=""/57, 0x39}], 0x4}, 0x1) [ 573.981934][T26081] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 574.008088][T26081] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000380)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000400)=""/220, 0xdc}, {&(0x7f0000000300)=""/13, 0xd}, {&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000500)=""/41, 0x29}, {&(0x7f0000000540)=""/103, 0x67}], 0x5, &(0x7f00000008c0)=""/198, 0xc6}, 0x40) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) r4 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x18, 0x18, &(0x7f0000000d00)=ANY=[@ANYBLOB="3a370800100000006a0804000000000018130000", @ANYPTR=&(0x7f0000000cc0)=ANY=[@ANYRES32=r4], @ANYBLOB="0000000000000000db2449a3117e1e3cff98d1afad71bca204024f78925d4052f9a68298fee9d6ba8a7f41a3a71f37a5415ac66485d42caeca21cf909e3d07bbe4665ff229dac14e2a81a51f60af13b5081f05ec6e9bea9d10c2d2962a8e67776e71ca8f24c6fa184d763ba8969029c8e2df3148ee0a47f49608a8da56a38458e9d7a2735781a2de80d875522ac99650c071fc812269069cf80437b65f33114cfbc4da1812b7"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x80, &(0x7f0000000280)=""/128, 0x41000, 0x864724da9f09759b, [], r2, 0x10, r3, 0x8, &(0x7f0000000a00)={0x1, 0x5}, 0xfa, 0x10, &(0x7f0000000a40)={0x3, 0x743f, 0x2, 0x95}, 0x10}, 0x70) write$cgroup_int(r1, &(0x7f0000000c80)=0xd0, 0x12) perf_event_open(&(0x7f0000000c00)={0x2, 0x70, 0x1, 0x3f, 0x6a8, 0x8, 0x0, 0x1, 0x10020, 0x7, 0x4, 0x3, 0x1000, 0x9, 0x100000001, 0x8000, 0x80000000, 0x3, 0x4, 0x1, 0x83bd, 0x40, 0x2, 0x9, 0x9, 0xc5a, 0x8001, 0x471, 0xed, 0x8, 0xfffffffffffffff9, 0x20000, 0x1, 0x23a, 0xfffffffffffffffc, 0x7f, 0x5, 0xff, 0x0, 0x5cd3, 0x5, @perf_bp={&(0x7f0000000040), 0x4}, 0x81, 0x80000001, 0x97, 0x9, 0x41c, 0x6, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x3) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:32 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x4c00000000000000}, 0x0) 17:38:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267036558002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:32 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') r2 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r0, @ANYRES64=r1, @ANYRES16, @ANYRESOCT=r1, @ANYRES32=r4, @ANYRES32=0x0, @ANYRES16=r0, @ANYRESOCT=r5], 0x54) [ 574.189676][T26099] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 574.240560][T26100] device nr0 entered promiscuous mode [ 574.276828][T26099] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:32 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:32 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x6000000000000000}, 0x0) [ 574.357168][T26111] device nr0 entered promiscuous mode 17:38:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030060002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) [ 574.462517][T26121] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 17:38:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x70c4f5448a3c8ad2, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'io'}, {0x2b, 'io'}, {0x2d, 'pids'}, {0x0, 'cpu'}, {0x2d, 'cpu'}]}, 0x26) [ 574.522298][T26121] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x6800000000000000}, 0x0) [ 575.008140][T26111] device nr0 entered promiscuous mode [ 575.126863][T26100] device nr0 entered promiscuous mode 17:38:33 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0xb, 0x51, &(0x7f0000000080)="366169be15d260f71f3ea6", &(0x7f00000000c0)=""/81}, 0x28) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x6c00000000000000}, 0x0) 17:38:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267035865002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000005c0)={'veth0_to_hsr\x00', 0x1000}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r2 = openat$cgroup_subtree(r0, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000640)={[{0x2b, 'rdma'}, {0x2d, 'pyds'}, {0x2d, 'rdma'}, {0x2b, 'io'}, {0x2b, 'io'}, {0x2d, 'memory'}, {0x2d, 'io'}]}, 0x26) r3 = socket$kcm(0x29, 0x5, 0x0) r4 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) close(r4) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000680)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r6, &(0x7f0000000040)="9c940b34519a3af6af3330a2106e7749ad133789aa59169f8eed26a55270da8ad57578d3043185a6dd04f59c9acd90f76cc892d3daf57728b4a45e46590f36b493e387984696e0f1d90ff175ad3c147c004e12c31b8822dcf2239860a13b064d4bd6ba6210ed3cf656cf132d1ad6305341e14f6ac8720a62825f0b1e03a52a7681eb729ff60e6f91ee88812c139ee001bf9581c76da2da5f37f44f8c14", &(0x7f0000000100)="be286acb9e7e86f86fa69d114dec508573fc9ba278aef6c0f5c5aa1d56f707b3e5c8a7a0ff046bd43293457e7f45b21e60f09b65a689be19da91a82ed1a6d8853af06de8779f7f9a5a4498a74bd9f6c669141cd4345f83fde4228de365454bb0d0dafdf667f6c30ad0397d9f4a9a772242cdb2c8f9dd784d3900649b7340badb789d7b220ece91883897e8d21d39257e6a07c5275e7f736b98d87ab8b4f5848899395f5b1191", 0xa}, 0x20) openat$cgroup_ro(r6, &(0x7f0000000580)='cpuacct.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x7400000000000000}, 0x0) [ 575.464281][T26154] device nr0 entered promiscuous mode 17:38:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa3000000000000070300def4170115c14115d9f265896209bbd30000feffdf7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b437e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d2dde8e9588f01a88e8dbea3b1bc4"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="1ae532b6b4d4f2cb20"], 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@typedef={0x6, 0x0, 0x0, 0x8, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4, 0x8}}]}, {0x0, [0xdc678854e2116f41, 0x0]}}, &(0x7f00000002c0)=""/54, 0x40, 0x36}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x4, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, [@map={0x18, 0x9, 0x1, 0x0, r1}, @map={0x18, 0x4, 0x1, 0x0, r2}, @jmp={0x5, 0x100000000, 0xa, 0x0, 0xb, 0x1}]}, &(0x7f00000000c0)='GPL\x00', 0x983, 0x18, &(0x7f0000000140)=""/24, 0x40f00, 0x0, [], 0x0, 0x3, r3, 0x8, &(0x7f0000000380)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xa, 0x9, 0x4}, 0x10}, 0x70) [ 575.512451][T26160] device nr0 entered promiscuous mode 17:38:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030081002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x7a00000000000000}, 0x0) 17:38:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 576.165668][T26185] device nr0 entered promiscuous mode [ 576.248785][T26160] device nr0 entered promiscuous mode 17:38:34 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\x00\x00\x00\x00\x00\x00\x00\x00eX0\x1fr\x94\"\xadlh\x83B\xb9\x00\x00\x01\x00\x00\x00\x00\x00\x01v\xec\t\xb4(\x04RR\x06\x00\x10\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ\x00\x00\x00\x00\x00\x00\x00'}]}, 0x7f) 17:38:34 executing program 4: unlink(&(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f00000002c0)={[{0x2b, 'pids'}, {0x0, 'io'}, {0x2d, 'io'}, {0x0, 'cpu'}, {0x0, 'cpu'}, {0x2d, 'memory'}, {0x6, 'cpu'}, {0x2d, 'rdma'}, {0x4f, 'pids'}]}, 0x31) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x9effffff00000000}, 0x0) 17:38:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x2}, 0x28) 17:38:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x80500, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x104000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r2, &(0x7f00000001c0)=0x4, 0x12) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x7ffff) 17:38:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a6552670303bd002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xb000000000000000}, 0x0) 17:38:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x3}, 0x28) [ 576.549305][T26197] device nr0 entered promiscuous mode 17:38:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030ec0002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xf0ffffff00000000}, 0x0) 17:38:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x4}, 0x28) 17:38:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 17:38:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f00000000c0)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:35 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x7ffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r2, 0xc0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={0x0, 0x3}, 0x0, 0x0, &(0x7f0000000840)={0x5, 0x7, 0xe438000000000000, 0x5}, &(0x7f0000000880), 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a00)=r3, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r0, 0x10, &(0x7f0000000080)={&(0x7f0000000040), 0x0, r3}}, 0x10) [ 577.197818][T26197] device nr0 entered promiscuous mode [ 577.257541][T26244] device nr0 entered promiscuous mode 17:38:35 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x143400, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a6552670300f0002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2000000000000, 0x0, 0x0, 0x87e, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x47b, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) 17:38:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xffffffff00000000}, 0x0) 17:38:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x5}, 0x28) 17:38:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xfffffffffffff000}, 0x0) 17:38:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x21, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0xfffffffffffffe66) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x6}, 0x28) [ 577.729869][T26262] device nr0 entered promiscuous mode 17:38:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030002002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) [ 577.851364][T26272] validate_nla: 18 callbacks suppressed [ 577.851380][T26272] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 577.883797][T26272] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 17:38:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) unlink(&(0x7f0000000040)='./file0\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 578.080040][T26288] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 578.112561][T26288] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') r2 = perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x3ff, 0x100000000, 0x80000001, 0x1, 0x0, 0x8, 0x400, 0x0, 0x59, 0x7, 0x10001, 0x913, 0x2, 0xff, 0x24f, 0x10001, 0x8, 0x6, 0x40, 0x35, 0xfffffffffffff801, 0x1ce2400, 0x9e00000000000000, 0x1, 0x9, 0x7, 0x3f, 0x3, 0xff, 0x4, 0x6, 0x5, 0x982, 0x8, 0x40, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x100000001, 0x1}, 0x2020, 0xffffffffffffff80, 0x2, 0x1, 0x1, 0x5, 0x7515}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0xbe2, 0x9, 0x6, 0x7ff, 0x0, 0x5, 0x400, 0x4, 0x2, 0x2, 0x1f, 0xb6d, 0x80, 0xfffffffffffffffd, 0x32, 0x9a7, 0x66e, 0x3, 0x3ff, 0xc82e, 0x10001, 0x3, 0xffffffff, 0x9, 0x7, 0x9, 0x200, 0xd7aa, 0x8, 0x9, 0x2, 0xb1, 0x4, 0x6, 0x6, 0x100000000, 0x0, 0x3, 0x3, @perf_bp={&(0x7f00000000c0)}, 0x40, 0x5, 0x40, 0x9, 0xfffffffffffffffe, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) [ 578.332638][T26262] device nr0 entered promiscuous mode [ 578.354746][T26295] device nr0 entered promiscuous mode 17:38:36 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x7}, 0x28) 17:38:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 17:38:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00~o +cpu '], 0x9) r1 = getpid() perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0x25f, 0x0, 0x1ff, 0x4, 0x0, 0x401, 0x5029d, 0x805897a6e86bd530, 0x4, 0x80000001, 0x2, 0x5, 0x4, 0x2, 0x3762, 0x5, 0x3, 0x6, 0x1749, 0x4, 0x123, 0x0, 0x2, 0x510, 0x200, 0x9, 0x81, 0x3ff, 0xdfe, 0x3, 0x3, 0x100, 0xfffffffffffffff8, 0xe5d8, 0x8, 0x4, 0x0, 0x56, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x8000, 0x400, 0xfffffffffffffffd, 0x9, 0x7, 0x200, 0x68}, r1, 0xe, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 17:38:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030003002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) [ 578.629262][T26295] device nr0 entered promiscuous mode [ 578.665688][T26305] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 17:38:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) r2 = socket$kcm(0x11, 0x2, 0x300) recvmsg(r2, &(0x7f0000007700)={&(0x7f00000073c0)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x0) r4 = getpid() perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x80, 0x17c, 0x0, 0xfa, 0x0, 0x9, 0x10000, 0xc, 0x10001, 0x1, 0x4, 0x7fff, 0x1, 0x80000001, 0x1, 0x40000, 0x9, 0xffffffff, 0xfffffffffffffffa, 0x0, 0x1, 0x5, 0x4, 0x6, 0x2, 0x40, 0x101, 0x1, 0x6d0e, 0x6, 0x0, 0x1f, 0x3, 0x4, 0x2, 0x876, 0x0, 0x8, 0x2, @perf_config_ext={0x6, 0x2}, 0x11105, 0x6, 0x7, 0xc, 0x9, 0x9, 0x3}, r4, 0x5, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000001b00)={0x6, 0x1, &(0x7f0000001a00)=@raw=[@generic], &(0x7f0000001a40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xc, 0xa, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x3526}, [@ldst={0x0, 0x3, 0x2, 0x2, 0xb, 0xc, 0x8000000000000013}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xfff}, @jmp={0x5, 0x3, 0x3, 0x1, 0xb, 0x80}, @ldst={0x2, 0x0, 0x3, 0x6, 0x5, 0x18, 0x8}, @map={0x18, 0x6, 0x1, 0x0, r1}]}, &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000280)=""/97, 0x40f00, 0x7, [], r3, 0xf, r5, 0x8, &(0x7f0000000300)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0xd, 0x2, 0x6}, 0x10}, 0x70) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 578.690218][T26305] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 17:38:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x8}, 0x28) [ 578.852605][T26321] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 578.878892][T26321] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:38:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030004002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 17:38:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x9}, 0x28) [ 579.023425][T26332] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 579.053905][T26332] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 579.283571][T26316] device nr0 entered promiscuous mode [ 579.353736][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 579.359612][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 579.365451][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 579.371204][ C1] protocol 88fb is buggy, dev hsr_slave_1 17:38:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 579.433735][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 579.439535][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 579.480003][T26314] device nr0 entered promiscuous mode [ 579.593811][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 579.599621][ C0] protocol 88fb is buggy, dev hsr_slave_1 17:38:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, r1, 0x12, 0x1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="00030e80493f1ec2cec9607e8864c4578ad7026b10210500cd020093dd86dd00008848ba65b9c39e80aca4b1d8c40176ec09b42804df670903dd82cd7c52060d297f94e5b3e35eb9e68b9adfd178514a941af96fe540551680107fdf79d1af8f4e56309ac9733d41cc0ff11999c3c3740f085a2000"/127], 0x7ffff) 17:38:38 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x100) 17:38:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0xa}, 0x28) 17:38:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030006002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 579.673779][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 579.679572][ C1] protocol 88fb is buggy, dev hsr_slave_1 17:38:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 17:38:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0xb}, 0x28) [ 579.800832][T26359] device nr0 entered promiscuous mode 17:38:38 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) r2 = perf_event_open$cgroup(&(0x7f0000000500)={0x3, 0x70, 0xffffffffffff94ff, 0x7, 0x80000000, 0xb81, 0x0, 0x6, 0x28000, 0x1, 0x94f, 0x100, 0x8, 0x0, 0x2, 0x0, 0x80, 0x3, 0xb623, 0x6, 0x3ff, 0x1, 0x5, 0x673eac, 0x9, 0x8001, 0x3, 0xa, 0x1, 0x1, 0x5, 0xff, 0xa00, 0x8, 0x6, 0x5, 0x8, 0x2, 0x0, 0x80, 0x2, @perf_bp={&(0x7f00000004c0), 0x1}, 0x1010, 0x8a6f, 0x1, 0x4, 0x8, 0x1, 0x6}, r1, 0xc, r0, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab040add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3162eb2180a1242074df515562f7729112d7dfcf439db90882e16467858fcd343186d4d3523e0f14fa1a084ab2995853f1f402dcc4701b560c142bae76cc6df410fab95cdc6024f443ee6247a3a5eabd422d8ce5079c5c2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001840)={0xffffffffffffffff, 0xc0, &(0x7f0000002c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=0xcb86, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x1}, 0x0, 0x0, &(0x7f0000001780)={0x3, 0x5, 0x5, 0x1}, &(0x7f00000017c0)=0x203, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=0x1}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) perf_event_open(&(0x7f0000000600)={0x8, 0x70, 0xffffffff, 0x80000001, 0x6, 0x7fff, 0x0, 0x0, 0x2, 0xc, 0x739308e6, 0x9, 0x80000000, 0x3f, 0x6, 0x8, 0x6, 0x1, 0x0, 0x3, 0x100, 0x7f, 0x5, 0x2, 0x3611, 0xb1d, 0x3, 0x6, 0x3, 0xea45, 0x1000, 0x8000, 0xffffffffffffff77, 0x9, 0x8, 0xffffffff, 0x3c14, 0xffff, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000580), 0x1}, 0x240, 0x3, 0xfffffffffffffffc, 0x6, 0xae, 0x5, 0x5}, 0xffffffffffffffff, 0x5, r5, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0x0, 0xffffffffffffffff, 0x0, 0x2c6, &(0x7f0000002cc0)='\'\xbd\xd9\xea\xb8\xc2\x06\xc6\b\xbb\xbd\x06\xbc\xbc\x9e\xa6uj\x97\xde\xc6{\xee\a=o\xbf\x7f\xecr\xd8\xfe!+\xdee+BJ\x8d\xa3\xbd\x93\xffK\xce\xad\a\x9e\xf4;\xc8v\a\x858g\xfd6\xdar\xc9GVN\xcecMCxSy\x1d\xf8\xd1b\'P\xd5\xf3\x1c=\r0\xe8),E\xb78[\xe0\xf8\xac\xb2\x9b\xdc\xe1x\xd1\xcdkY\x9e\x85E\xb6\v~\x1a+\x13P\xd4-EA\xa1E\xe9rI\x1d\xac\x1d7{\xdc\t\xb3\xce\xa8N\xf6\x820C\x10\x81\xe8E>\x1c\x19\xe5\xa3aO\b\xfe\x1b\xb3\x10\xbe\x13\x9eI{\xc4\r\xb4+,g\xe8\xa7\xa7b0s\xf2\x11\xbc\xa5\x0fW\xde\xd9\bJ%\xdd[\x85B\xd6Lw\x03\x143\xafN\ni\x88\xd5\xda\x01P\xfa^\xe3_\x87/\xff\x9b\r\bF\xdb%\xa1:.!b\x98\xf3\x1a\x04\x96\xf9\xd1\x1e)F\xe7/\xf6\x90\xbad\x83\xd0D\xb1{\x1fB\xca\x00\x85\x1aO\x19\xae\xddY\x98\x1f\xee\x99\x04:\x9c\x0f\xc3j|\xb2\x10]6\xb43\x9b)\xe8 \x15\xc3B\xeb\x00-\xc7\xa3\xa3\xbc_\x8eobI\xca\xf8A\x17\xd7 \x81\x1aY\xe8\xb8\xab', r4}, 0xfffffffffffffff4) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r4, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r6, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x3, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x3, 0x4}, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x9, 0x101, 0x1}, &(0x7f00000002c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x7}}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r3, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a65526703000a002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 17:38:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0xc}, 0x28) 17:38:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 580.557352][T26374] device nr0 entered promiscuous mode [ 580.702964][T26364] device nr0 entered promiscuous mode 17:38:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 17:38:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0xd}, 0x28) 17:38:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000380)=0x770) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) r2 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0xfffffffffffffff7, 0x8001, 0x0, 0x7, 0x0, 0xa4, 0x0, 0x3, 0x6254, 0x5, 0x2, 0xffffffff, 0x42a3, 0x101, 0x1, 0x5, 0x8, 0x1, 0x0, 0x0, 0x7cd, 0x1ff, 0x1, 0xc0000, 0x9, 0x2, 0x0, 0x0, 0x3, 0x4, 0x400, 0x10001, 0x4, 0x12b6, 0x400, 0xfffffffffffffff8, 0x0, 0x1, 0x4, @perf_config_ext={0xffffffff, 0x80}, 0x56c02, 0x0, 0x1, 0x6, 0x5, 0x0, 0x6}, 0x0, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000280)={0x4, 0x105, 0xffffffff, 0x80000000, 0x4, 0x2, 0x0, 0x401, 0x1000, 0x4, 0x6, 0x8, 0x3ff, 0xfffffffffffffff8, 0x4, 0xfffffffffffff800, 0xfffffffffffffffd, 0x6, 0x1000, 0x401, 0x3, 0x4, 0x7ff, 0x6, 0x1, 0x20, 0x80000004, 0x8, 0x3, 0x7, 0xeb, 0x9, 0x401, 0x1, 0x100, 0x800, 0x5, 0xfffffffffffffffc, 0x0, 0xec2d, 0x5, @perf_bp={&(0x7f0000000140)}, 0x1000, 0x3, 0x4, 0x0, 0x3, 0x916, 0x8}) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="48000000140081fb7059ae08060c04002c1100b915648701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f0000102900", 0x48}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x7) r6 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = gettid() perf_event_open(&(0x7f0000003c80)={0x4, 0x70, 0x800, 0x227, 0x346b, 0x1ff, 0x0, 0x45, 0x10000, 0x1, 0xffffffffffffffff, 0xffffffffffffff01, 0x8001, 0x80000000, 0x1c5a088e, 0x10000, 0xffffffffffff4c43, 0xda, 0x200, 0x4, 0x10000, 0x513dbbe7, 0x1f, 0x20, 0x2, 0x6, 0x5, 0x9, 0x7, 0x3, 0x10001, 0x0, 0x255679dd, 0x8bf2, 0x5, 0xf37c, 0x3, 0x400, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000980), 0xa}, 0x4000, 0x7, 0x800, 0x3, 0x5, 0x9, 0xa8}, r7, 0x5, r6, 0x9) recvmsg$kcm(r5, &(0x7f0000000580)={&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000001880)=""/4096, 0x1000}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001840)={0xffffffffffffffff, 0xc0, &(0x7f0000002c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=0xcb86, 0x0, 0x0, 0x0, &(0x7f0000001740)={0x2, 0x1}, 0x0, 0x0, &(0x7f0000001780)={0x3, 0x5, 0x5, 0x1}, &(0x7f00000017c0)=0x203, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=0x1}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0x0, 0xffffffffffffffff, 0x0, 0x2c6, &(0x7f0000002cc0)='\'\xbd\xd9\xea\xb8\xc2\x06\xc6\b\xbb\xbd\x06\xbc\xbc\x9e\xa6uj\x97\xde\xc6{\xee\a=o\xbf\x7f\xecr\xd8\xfe!+\xdee+BJ\x8d\xa3\xbd\x93\xffK\xce\xad\a\x9e\xf4;\xc8v\a\x858g\xfd6\xdar\xc9GVN\xcecMCxSy\x1d\xf8\xd1b\'P\xd5\xf3\x1c=\r0\xe8),E\xb78[\xe0\xf8\xac\xb2\x9b\xdc\xe1x\xd1\xcdkY\x9e\x85E\xb6\v~\x1a+\x13P\xd4-EA\xa1E\xe9rI\x1d\xac\x1d7{\xdc\t\xb3\xce\xa8N\xf6\x820C\x10\x81\xe8E>\x1c\x19\xe5\xa3aO\b\xfe\x1b\xb3\x10\xbe\x13\x9eI{\xc4\r\xb4+,g\xe8\xa7\xa7b0s\xf2\x11\xbc\xa5\x0fW\xde\xd9\bJ%\xdd[\x85B\xd6Lw\x03\x143\xafN\ni\x88\xd5\xda\x01P\xfa^\xe3_\x87/\xff\x9b\r\bF\xdb%\xa1:.!b\x98\xf3\x1a\x04\x96\xf9\xd1\x1e)F\xe7/\xf6\x90\xbad\x83\xd0D\xb1{\x1fB\xca\x00\x85\x1aO\x19\xae\xddY\x98\x1f\xee\x99\x04:\x9c\x0f\xc3j|\xb2\x10]6\xb43\x9b)\xe8 \x15\xc3B\xeb\x00-\xc7\xa3\xa3\xbc_\x8eobI\xca\xf8A\x17\xd7 \x81\x1aY\xe8\xb8\xab', r8}, 0xfffffffffffffff4) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000000)) perf_event_open(&(0x7f00000003c0)={0x3, 0x70, 0x11, 0x2, 0x8, 0xffffffffffffffe1, 0x0, 0x897, 0x80, 0x2, 0x9, 0xc42, 0x101, 0x3, 0x5, 0x3e00000, 0x9, 0x1000, 0x0, 0x35, 0x40, 0x6, 0x0, 0x1000, 0x6, 0x6, 0x1ff, 0x7, 0xe5a0, 0xa2, 0x8001, 0x7ff, 0x1ff, 0x4, 0x0, 0x7, 0xfffffffffffffffa, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x81, 0x5}, 0xa00, 0x8001, 0x3f, 0x8, 0x5, 0x8, 0x4}, 0x0, 0x9, r9, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000300)=r4, 0x4) 17:38:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a65526703000c002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:39 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x1) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="69b582db1ec2cec9607e8864c4578ad7026b0021e1020093dd86dd000002000000000000729422ad6c688342b9000480aca4b1d8c40176ec09b4280452fd79867a3f5fa4ff03ff297f9401b4e35eb9e68b9adfd178d14a941af96fe540552780107fdf79d1af8f4e56309ac9733d41cc0ff119000000000000"], 0x7ffff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r1, 0x1, 0x1, 0x101, &(0x7f0000000040)=[0x0], 0x1}, 0x20) 17:38:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7f) 17:38:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 581.080531][T26410] device nr0 entered promiscuous mode 17:38:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0xe}, 0x28) 17:38:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="40696f202b6370752015069e227ad18c0b07da71f96b3af1b16b6498191ff9e93311616a5380701d9ee37bfe701461ff487ea681bc6891f0aca73c1a1caebfb2f1a0828ad04984422f00191d504288f8e0a5b92a0c75e64186ffc3996f0a7dfe08544f5431774c3fff23cbc2ac2507b03c3f6c462547d175ea0ebbc44bd169a42dfa75b25677b342f8353a8599"], 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 17:38:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0xf}, 0x28) 17:38:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 17:38:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x3}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b70000000000000095000000000000000f5e7344a7e1ae1670f595e9392c955a5d624095646fc86fe7efafbd8da26e2178b5b422e9ca6d86bfcf6ae796342c6deb64c20535b878e05a09aa2f3285d8cf6e353d1eca17ea65c88c99238a5e8cad3d5026433ed39337d6d2b3e4e450c36da9ab3ca9ed4513c34bea40598be7f6ed5ddad624a80026f4bab018add8da8d6dde8ee8dbea3b1bc4d52877b4d5a733d8531b9f9d3577b79b9912d03ae3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 17:38:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x10}, 0x28) 17:38:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a65526703000e002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) [ 581.870745][T26410] device nr0 entered promiscuous mode 17:38:40 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x20481, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88d\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) r2 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x6e5, 0x3, 0x8, 0x0, 0x0, 0x400, 0xbf64aa48baebde3b, 0xffffffffffffff01, 0x7f, 0x2, 0x8, 0x7, 0x2, 0xc3, 0x8, 0x294a, 0x2, 0x0, 0x0, 0x1, 0xc0, 0x3, 0x1, 0x0, 0x4, 0x0, 0x5, 0x1, 0x7, 0x2, 0x6, 0x8, 0x40f, 0x4, 0x7ff, 0x0, 0x4, 0xa845bc34e6823cdb, @perf_config_ext={0xfffffffffffffff8, 0x3}, 0x8030, 0x4, 0x59c, 0x8, 0x8, 0x9, 0x8000000}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xd25ae15cc51be6fc) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x80000000) 17:38:40 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0x88, 0xd2, &(0x7f00000000c0)="b68883ca47235513e5d5363d57a612047857a7cf59ff59d9d12e55a6b4ca265ea179004a2b8f55fee7a330513c16dc1bb1d6ac6f5cdaa1536698f87c438c96de9096b2006d2e822640f4cd99ae877db7d978e4c3ff6a80e6b7c001d2c9bca31fa10f353af4ca391719435762955255e5c93109f2a41852346b060fcbaccc42b57b83943daa2c3cb9", &(0x7f0000000580)=""/210, 0x40}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8a\xca\x91\xe5u#D\xbd\xdfCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;\xb9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb') write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\x88G\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xbaeX0\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) 17:38:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a65526703000f002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 17:38:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x27, 0x0, &(0x7f0000000080)="f8ac491f5cd6d4d2f649cbb9cf5adb62550ce5e75797b9a0f82629dc2a0cfb1eaca9d3f135f4d0", 0x0, 0x103}, 0x28) 17:38:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 17:38:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x11}, 0x28) [ 582.083345][T26467] device nr0 entered promiscuous mode 17:38:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 17:38:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x0, 'cpu'}, {0x2b, 'cpu'}]}, 0xfffffdab) r1 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={&(0x7f0000000280)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e23, 0x3}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000380)="5af70077881b776b9baf8c8c086cf0fb9d3902d38a7fb917729a9744169aa46e49663eea6d1536dc6d49f43ea317d669a553905c5050aa73eaed613ec0d098971b8470c2beb143fa740327e7e19231472a884076c3820697d56ad4fd2152f54c8a1bc8d34c0c2cbfed851c5e877a3390826155817d4c3ed2cd230c", 0x7b}], 0x1, &(0x7f0000000740)=[{0xc8, 0x111, 0x6, "d7df78b7104f6f1494115af56bb99922173b286394c1dab39ef28f4bcd4af8bba9f49648388cf325940e0676570f4b829a39437807a72227fc42637c9c239225783f8af8e3ba194ceda0a8db2a86c3003d0855f4ba81e86893c26b4a9849d97ccc1a80076e2aeeeaf5c9959c4f51ca05dc8ed49da14d4cd39d72e56ad84465296b4dc3a055079aa8f9d1b92ef0303fa5476be12388d01f2963ae1146607a6ffc8db30e28b5ccf8e11da0a9bcf6fe976eecd3b981d020"}, {0x1010, 0x117, 0x9, "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"}, {0xc8, 0x0, 0x7, "35d8df95c5c54dbbdb96d93f202a4a4991771c22e0c1b4a52f7965ded1ac50b60bcc5df93c4e1534314f3794c941f3df7dc39f0955f0d976f2c6920f26183d415467586374456d2adf3c1e42499c653ba4f8671a380886579fe339296ec99ac8bdda8f1a907f4f50cf99cf0e2a82820106fbec58574729c079e6f39bbf36976cffabe5730792e6237844a4da08859553534dc663cb1988fecf6b7f8b977235526cebc0fc20b762481b0ee9bfc0e48b4d6883"}], 0x11a0}, 0x20000000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) 17:38:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x12}, 0x28) 17:38:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000500d25a80648c6300000080fc000e0002400a000000053582c137153e370900018002f10000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 17:38:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) r2 = socket$kcm(0x11, 0x2, 0x300) recvmsg(r2, &(0x7f0000007700)={&(0x7f00000073c0)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001b00)={0x6, 0x1, &(0x7f0000001a00)=@raw=[@generic], &(0x7f0000001a40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x9, 0x6, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x691e, 0x0, 0x0, 0x0, 0x7}, [@call={0x85, 0x0, 0x0, 0x69}, @ldst={0x0, 0x0, 0x0, 0x1, 0x6, 0xfffffffffffffffe, 0x8}, @alu={0x7, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000380)='syzkaller\x00', 0x8, 0xc8, &(0x7f00000003c0)=""/200, 0x41000, 0x1, [], r3, 0x12, r4, 0x8, &(0x7f00000004c0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x5, 0x4, 0x2, 0x8b4}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) r5 = openat$cgroup_ro(r1, &(0x7f0000000080)='memory.events\x00', 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f00000000c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x2b, 'cpu'}]}, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) [ 582.554769][ T64] WARNING: CPU: 1 PID: 64 at kernel/bpf/core.c:851 bpf_jit_free+0x157/0x1b0 [ 582.563790][ T64] Kernel panic - not syncing: panic_on_warn set ... [ 582.570405][ T64] CPU: 1 PID: 64 Comm: kworker/1:1 Not tainted 5.3.0-rc3+ #0 [ 582.577774][ T64] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 582.587860][ T64] Workqueue: events bpf_prog_free_deferred [ 582.593676][ T64] Call Trace: [ 582.596985][ T64] dump_stack+0x172/0x1f0 [ 582.601343][ T64] ? bpf_jit_free+0x140/0x1b0 [ 582.606043][ T64] panic+0x2dc/0x755 [ 582.610476][ T64] ? add_taint.cold+0x16/0x16 [ 582.615176][ T64] ? __kasan_check_write+0x14/0x20 [ 582.620303][ T64] ? __warn.cold+0x5/0x4c [ 582.624657][ T64] ? __warn+0xe7/0x1e0 [ 582.625322][ T3906] kobject: 'loop4' (0000000027c6f46c): kobject_uevent_env [ 582.628950][ T64] ? bpf_jit_free+0x157/0x1b0 [ 582.640736][ T64] __warn.cold+0x20/0x4c [ 582.645029][ T64] ? kfree+0x226/0x2c0 [ 582.649117][ T64] ? bpf_jit_free+0x157/0x1b0 [ 582.653810][ T64] report_bug+0x263/0x2b0 [ 582.654477][ T3906] kobject: 'loop4' (0000000027c6f46c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 582.658302][ T64] do_error_trap+0x11b/0x200 [ 582.658324][ T64] do_invalid_op+0x37/0x50 [ 582.658339][ T64] ? bpf_jit_free+0x157/0x1b0 [ 582.658357][ T64] invalid_op+0x23/0x30 [ 582.658375][ T64] RIP: 0010:bpf_jit_free+0x157/0x1b0 [ 582.691813][ T64] Code: 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 5d 48 b8 22 01 00 00 00 00 ad de 48 39 43 70 0f 84 05 ff ff ff e8 69 66 f4 ff <0f> 0b e9 f9 fe ff ff e8 fd 9f 2e 00 e9 d9 fe ff ff 48 89 7d e0 e8 [ 582.711438][ T64] RSP: 0018:ffff8880a942fcb0 EFLAGS: 00010293 [ 582.717514][ T64] RAX: ffff8880a94201c0 RBX: ffff88808e51c0c0 RCX: ffffffff817ce28d [ 582.725497][ T64] RDX: 0000000000000000 RSI: ffffffff817e2317 RDI: ffff88808e51c130 [ 582.733474][ T64] RBP: ffff8880a942fcd0 R08: 1ffffffff1517f00 R09: fffffbfff1517f01 [ 582.741469][ T64] R10: fffffbfff1517f00 R11: ffffffff8a8bf807 R12: ffffc9000193d000 [ 582.750407][ T64] R13: ffff88808e51c128 R14: ffff8880a9acb700 R15: ffff8880ae934f00 [ 582.758426][ T64] ? bpf_jit_uncharge_modmem+0x1d/0x30 [ 582.763896][ T64] ? bpf_jit_free+0x157/0x1b0 [ 582.768598][ T64] bpf_prog_free_deferred+0x27a/0x350 [ 582.774946][ T64] process_one_work+0x9af/0x1740 [ 582.779904][ T64] ? pwq_dec_nr_in_flight+0x320/0x320 [ 582.785292][ T64] ? lock_acquire+0x190/0x410 [ 582.789994][ T64] worker_thread+0x98/0xe40 [ 582.794503][ T64] ? trace_hardirqs_on+0x67/0x240 [ 582.799570][ T64] kthread+0x361/0x430 [ 582.803645][ T64] ? process_one_work+0x1740/0x1740 [ 582.808850][ T64] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 582.815101][ T64] ret_from_fork+0x24/0x30 [ 582.821492][ T64] Kernel Offset: disabled [ 582.826214][ T64] Rebooting in 86400 seconds..