', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 1985.595286][T20558] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:43 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000300000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:43 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000000000ff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a48655a0b000000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:44 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000a00300000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:44 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000008000a0ff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1985.973336][T20588] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 1986.012591][T20573] device nr0 entered promiscuous mode [ 1986.046507][T20576] device nr0 entered promiscuous mode [ 1986.065391][T20589] device nr0 entered promiscuous mode 01:04:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a48651611000000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 1986.233315][T20601] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 1986.469880][T20571] device nr0 entered promiscuous mode 01:04:44 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) socket$kcm(0x29, 0x7, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000100)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) recvmsg(r1, 0x0, 0x2000) 01:04:44 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000500000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:44 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000008001a0ff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a48651612000000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 1986.660680][T20609] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865165a000000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:45 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000600000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:45 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000008002a0ff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1986.879955][T20629] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b020000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:45 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000700000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:45 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000002000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1987.094285][T20626] device nr0 entered promiscuous mode [ 1987.111667][T20630] device nr0 entered promiscuous mode [ 1987.129894][T20633] device nr0 entered promiscuous mode [ 1987.201230][T20651] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 1987.531968][T20624] device nr0 entered promiscuous mode 01:04:45 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) socket$kcm(0x29, 0x7, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000002a1fc450629a9e2791df4ed89fa56e0ed7956b75bc127813995aac1a4579"], 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) recvmsg(r1, 0x0, 0x2000) 01:04:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b030000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:45 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000900000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:45 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000003000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 1987.718570][T20670] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:46 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000a00000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b040000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 1987.799261][T20676] device nr0 entered promiscuous mode 01:04:46 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000004000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1987.951243][T20687] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b050000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:46 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000001100000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:46 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) socket$kcm(0x29, 0x7, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0x1, 0x1, 0x2, &(0x7f0000000040)=[0x0, 0x0, 0x0], 0x3}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') socket$kcm(0x29, 0x5, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) recvmsg(r2, 0x0, 0x2000) 01:04:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:46 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000005000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b060000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:46 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000003f00000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:46 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000006000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b070000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:46 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000004000000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1988.681371][T20732] device nr0 entered promiscuous mode 01:04:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b0a0000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:47 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000007000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1988.798377][T20723] device nr0 entered promiscuous mode 01:04:47 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) close(r0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) recvmsg(r2, 0x0, 0x2000) 01:04:47 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000005c00000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b0c0000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:47 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000008000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 1989.201834][T20771] device nr0 entered promiscuous mode 01:04:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:47 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000fe8000000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b0e0000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 1989.339676][T20784] device nr0 entered promiscuous mode 01:04:47 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000009000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b0f0000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:47 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000080fe00000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:47 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) socket$kcm(0x29, 0x7, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') recvmsg$kcm(r1, &(0x7f0000000740)={&(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)=""/100, 0x64}, {&(0x7f0000000100)=""/22, 0x16}, {&(0x7f0000000440)=""/223, 0xdf}, {&(0x7f0000000340)=""/147, 0x93}, {&(0x7f00000002c0)=""/50, 0x32}, {&(0x7f0000000540)=""/147, 0x93}, {&(0x7f0000000600)=""/20, 0x14}], 0x7, &(0x7f00000006c0)=""/75, 0x4b}, 0x2000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) recvmsg(r1, 0x0, 0x2000) [ 1989.674835][T20796] device nr0 entered promiscuous mode [ 1989.714296][T20797] device nr0 entered promiscuous mode 01:04:47 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000000a000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:47 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000004003000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b100000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:48 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000010000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1989.911454][T20823] validate_nla: 6 callbacks suppressed [ 1989.911465][T20823] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 1990.338245][T20825] device nr0 entered promiscuous mode 01:04:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b480000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:48 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000010000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:48 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000340000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1990.447080][T20846] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b4c0000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:48 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000011000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1990.671359][T20862] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 1990.821443][T20856] device nr0 entered promiscuous mode [ 1990.910643][T20865] device nr0 entered promiscuous mode 01:04:49 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) socket$kcm(0x29, 0x7, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) socket$kcm(0x29, 0x0, 0x0) recvmsg(r1, 0x0, 0x2000) 01:04:49 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000a00080000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:49 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000005c000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b600000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 1991.219285][T20882] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b680000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:49 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000a00180000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:49 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000aa000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1991.555988][T20914] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b6c0000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:49 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000010000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1991.598601][T20895] device nr0 entered promiscuous mode [ 1991.612556][T20900] device nr0 entered promiscuous mode 01:04:49 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000030000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1991.741777][T20922] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 1992.012380][T20905] device nr0 entered promiscuous mode 01:04:50 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) socket$kcm(0x29, 0x7, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f00000002c0)='selfvmnet0}#*\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="574df8ca151a85b9f41188a9bc76fec6cfbe0dda41f07fd9e775301debcbd874c2e36f231f67dbb5abd7b4f1dd3abb14b993ac6f25c25bee43c3b9ac8543b8dc71e2219d0c6789241b87a8d14ddf5b4c4108f98fb3bf1d8e5010b46884ac8aec642d0f431e68a0e79124c201cb0ec46b702f7deb568665a328dc"], 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) recvmsg(r1, 0x0, 0x2000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000240)="5fa727f4a58753da1c24265cc3f0a6c5d554dbb5bf1cb3d8f11bfc6ba452d26060f066dfee694ab883204a63a5e5a6be8c9c88d16a8a472124378b1565b3549a7d20e07b1610e1d333203aa20a1b14558fb335cc41b45236c8d1395681482969ed71747aaf1731b4525b43b8c75e676313"}, 0x10) 01:04:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b740000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:50 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000020000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:50 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000050000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 1992.314725][T20944] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:50 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000060000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:50 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000030000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b7a0000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:50 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000070000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1992.643481][T20940] device nr0 entered promiscuous mode [ 1992.661587][T20973] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 1992.686474][T20957] device nr0 entered promiscuous mode 01:04:50 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000040000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1992.698803][T20960] device nr0 entered promiscuous mode 01:04:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160bf00000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 1992.842754][T20983] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 1993.210256][T20954] device nr0 entered promiscuous mode 01:04:51 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000050000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:51 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000090000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160bfc0000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:51 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) socket$kcm(0x29, 0x7, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="006386dd17dd6cb424399eed3c94062a379517ead65e0202cb9921fe7bcabcf1ea5924cdc1dd54b6d91761ea696bbf05c954d6708edb1fecd25294f062e7108125f48c35cd77610e2abeccfb0cda585f2fd952f2448f7d3565e22d6384635a61a307530e3f27ae753db9e149f97c5f2970da52c0be0e478bc939d13b92064f1309c60a8ba3fe59c9c78110102adc59a93410ab2e4d9f71f39aa31200a6d56e3ebc3d2e311c6ae6663e0f6eb686a17ab664f083757038dfa642d12d54"], 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) recvmsg(r1, 0x0, 0x2000) 01:04:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:51 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000060000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1993.324686][T20993] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000300d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:51 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000000a0000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1993.404128][T21003] device nr0 entered promiscuous mode 01:04:51 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000070000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b4a0400d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:51 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000110000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:51 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000080000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000500d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:52 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000003f0000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1994.118440][T21001] device nr0 entered promiscuous mode [ 1994.138438][T21014] device nr0 entered promiscuous mode 01:04:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 1994.309669][T21007] device nr0 entered promiscuous mode 01:04:52 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) socket$kcm(0x29, 0x7, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0xd, &(0x7f00000000c0)='/dev/net/tun\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x4, 0x5, 0x10000, 0x80000001, 0x0, 0x0, 0x20080, 0x4, 0xbd, 0x7ff, 0x0, 0xffffffffffff8000, 0xffffffffffffcc8d, 0x0, 0x6, 0x4, 0xc09, 0x6, 0x8000, 0x9, 0x5, 0x1, 0x6, 0x1, 0x81, 0x9, 0x7f, 0xfffffffffffffff8, 0x9, 0x444f, 0x7, 0x1, 0x3, 0xbd9, 0x1, 0x100000001, 0x0, 0x800, 0x1, @perf_config_ext={0x10000, 0x1}, 0x0, 0xfff, 0x9ff, 0x7, 0x0, 0x100000, 0x95}, r2, 0x1, r3, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="7b7a78119e78eb3f9458d8b63d735587859e4bbc36935bb509c840c4c3a43d4189c2827bb363c17a7780e22362764c61c202047c2eff9b6d3ccfdbf15c20ad86f2fc7e62c1cf99dfa6f3d4de77cdfbe9264bdabbf32e59bf1a6a2e96529c7e357a3ba2ad3163146c74f18c104338c19460e80031d64b10827aeab6f654f02cce5c3b98eb8bd87aaade9fe5cc83d3e713bda9fb77d5a61078377900630e3b8f25d144d4946be9f21c6123b1"], 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) recvmsg(r1, 0x0, 0x2000) 01:04:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000600d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:52 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000400000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:52 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000090000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 1994.474000][T21051] device nr0 entered promiscuous mode 01:04:52 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000a0000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000700d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:52 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000005c0000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:52 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000100000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000a00d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:53 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000fe800000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1995.047947][T21071] device nr0 entered promiscuous mode 01:04:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 1995.215319][T21069] device nr0 entered promiscuous mode [ 1995.314983][T21065] device nr0 entered promiscuous mode [ 1995.404171][T21097] device nr0 entered promiscuous mode 01:04:53 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) socket$kcm(0x29, 0x7, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0f693d9807ee522c76165d3018b6aeefd95fe92d30b7933953b924ef7de284a2ad57a588017c1c2ae3eb363ced91cefae0b699081a16f2375cae97c4805fda5765ed629ce32348099cf044227f02cc7ca6e54b86369aedf07b4aeece907a1832f5170e0154616eef5cd49f7f825f82a40b272812fa5ad35cbb94e678cd95f72073f0ffa848ffef9e7658936e118f7dad727fdf499f8a"], 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) recvmsg(r1, 0x0, 0x2000) 01:04:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000c00d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:53 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000110000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:53 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000080fe0000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 1995.541150][T21102] validate_nla: 6 callbacks suppressed [ 1995.541160][T21102] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000e00d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:53 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000400300", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:53 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000003f0000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1995.893888][T21132] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000f00d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:54 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000400000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:54 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000001000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1995.978280][T21120] device nr0 entered promiscuous mode [ 1995.992350][T21117] device nr0 entered promiscuous mode [ 1996.100846][T21147] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 1996.297903][T21135] device nr0 entered promiscuous mode [ 1996.316710][T21112] device nr0 entered promiscuous mode 01:04:54 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) socket$kcm(0x29, 0x7, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='\x00') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) recvmsg(r1, 0x0, 0x2000) 01:04:54 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000005c0000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:54 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000034000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b002000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 1996.596629][T21157] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b003f00d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:54 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000a0008000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:54 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000ffffff8d0000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1996.806888][T21178] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b004000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:55 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000a0018000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:55 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000008000a00000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1996.977066][T21177] device nr0 entered promiscuous mode [ 1996.992769][T21184] device nr0 entered promiscuous mode [ 1997.034143][T21195] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:55 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) socket$kcm(0x29, 0x7, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="006386ec0730eb49856fe9c37267460abe7a4624f927d539cea1a0322c603c2678d6e3f4cd791b506a0ff1afb61fcbc15fcb547631bc958fdfe1f857e1d23055129ed6244e3f5e0c3234a348e32800c728e89c792cd1b829dba88d6bfa1e2f33d4c28f2a00048b6be350f4d2aca79c9a406e7880e88f62bef916ff5949b9773ae25ebac83ac9abd4e71601eb3536ec264ef2276187c3fa80001f29b0d177eddae49a3b6cbf2a601434e2f03380052e2505ac388675d722ce4320ec57a5355dabbbb0f1badd4f3b92720d56c88c246bf12ab3481e6d959c861539bfcb4f5c6484fdd5ef910877ab50e74480186126e714cc6e917213ac46105eb57db4fd47b424ca3b5b0707000000e2ce403f34d80b80d63f8d3dd97e6b32b11547b7f6c53dda15280c7203fb56821f4e73feedca371f9556a9bbab3c2af7cd6f5b17419f72cd907ea35583b26296645d6607cce13d812a07f3c960f720cb76ac39f57b00000000000000d4d16657479b0feba85099cc8bd581ce03ff8e0c057fcdb9d99a7ef47b29dd"], 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) recvmsg(r1, 0x0, 0x2000) 01:04:55 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000008001a00000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:55 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000a0028000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b004800d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 1997.574399][T21211] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:55 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000003a00000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:55 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000001", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b044a00d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 1997.835220][T21232] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:56 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000fffffff50000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:56 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000002", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1997.899145][T21225] device nr0 entered promiscuous mode 01:04:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b004c00d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 1997.942548][T21230] device nr0 entered promiscuous mode [ 1998.002862][T21245] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 1998.276562][T21223] device nr0 entered promiscuous mode 01:04:56 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c", 0x4}, 0x20) socket$kcm(0x29, 0x7, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) recvmsg(r1, 0x0, 0x2000) 01:04:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b655800d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:56 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000003", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:56 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000080fe0000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 1998.424351][T21260] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:56 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000004", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:56 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200007fffffff0000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b006000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:56 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000005", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b586500d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:57 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200008dffffff0000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1998.771711][T21282] device nr0 entered promiscuous mode [ 1998.795766][T21280] device nr0 entered promiscuous mode [ 1999.177832][T21275] device nr0 entered promiscuous mode 01:04:57 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) socket$kcm(0x29, 0x7, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={r2, &(0x7f0000000240)="f4c71850f1b6a574e610167bbd9344eaba212c5e181c0630c6443b25fbfebc9c334190ad2fd07ae7552330c151bae7c5196513f4b2246a5197aafefb63f6be6464103cd2f12b21226c5d184128289a535bc8c9d4e5e300a8a564863e8d0d17687ac5ef0ed8f331b5649b07eb3f1d5b084df311a58c2ae4042d6bea4f4ab582ce6fd4b8a9cfca2771a87fab9f7202762681e723fcda5c7e4bff8518462bdeb1e17275022a4efcfe3143275822bd1b", &(0x7f0000000dc0)=""/4096}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) recvmsg(r1, 0x0, 0x2000) 01:04:57 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000006", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:57 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000f5ffffff0000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b006800d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b006c00d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:57 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000ffffffffa003000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:57 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000007", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b007400d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:57 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000008", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:57 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000100000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1999.661912][T21337] device nr0 entered promiscuous mode [ 1999.683603][T21331] device nr0 entered promiscuous mode [ 1999.970280][T21330] device nr0 entered promiscuous mode 01:04:58 executing program 1: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f0000000080)='syz0\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x9, 0x4, 0x1, 0x1, 0x0, 0xfff, 0x80, 0x8, 0x81, 0x7fffffff, 0x7, 0xff, 0x4, 0x3ff, 0x4, 0x1ff, 0x0, 0x70, 0x0, 0x4, 0x42, 0x2, 0x7, 0xffff, 0x1, 0x100, 0x3, 0x3f, 0x3, 0xe1, 0x9, 0x6, 0x200, 0x5751, 0x8, 0x9, 0x0, 0x81, 0x1, @perf_bp={&(0x7f0000000040), 0x8}, 0x1, 0x10001, 0x3, 0xb, 0x4, 0x101, 0x900000000}, r0, 0xf, r1, 0xa) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mem_exclusive\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB='\n1'], 0x2) 01:04:58 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000fffeff08", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b007a00d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:58 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000003400000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160bfe8000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:58 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000009", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:58 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000ffffffffa000800000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b008100d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) sendmsg$sock(r0, &(0x7f0000000540)={&(0x7f0000000200)=@sco={0x1f, {0x7, 0x9a3, 0x0, 0x6, 0x8, 0x2}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000018c0)="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", 0x1000}, {&(0x7f0000000280)="70f101e04b51a795ac106e19b48cc46e28478315bcb6f43e2b1786cae948e4820bb9", 0x22}, {&(0x7f00000002c0)="3ff31310194714c81a14ec9e426395fde484c56e35be0c602ab0fdbda08f5d0a016432be8ee1c25a85492be5091d727d6b66ba11d7b65085985783278da11970", 0x40}, {&(0x7f0000000300)="bba79dcfa263201dabe154ed3a793579a3f5d0657c22e4a1513a61aba27d25dda468ba4616c6035e7b4b7e33da547a491d94bbd7cdf3e65f64624591d608948db9cb5e20265feedcb397d5226847b39ef6d7cfa6f3", 0x55}], 0x4, &(0x7f0000000440)=[@txtime={{0x18, 0x1, 0x3d, 0x6b9}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x1f}}, @timestamping={{0x14, 0x1, 0x25, 0x10001}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x74fa}}, @timestamping={{0x14}}], 0xf0}, 0x40) socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)=ANY=[@ANYBLOB="07000000000000000000d5fcc9d509b9233c4292a8ae00000000000000"]) perf_event_open$cgroup(&(0x7f0000000fc0)={0x0, 0x70, 0x100000000, 0x6, 0x1, 0x0, 0x0, 0x7, 0x100, 0x4, 0x6, 0x2b, 0x101, 0x2, 0x5, 0x10000, 0x1, 0x100000000, 0x5, 0x0, 0x5, 0x2, 0x9, 0xf68a, 0x6, 0x1, 0x1ff, 0x1, 0x7, 0x8, 0xffffffff, 0x400, 0x3ff, 0x2faa, 0x3, 0x7ff, 0x9, 0x5, 0x0, 0x101, 0x5, @perf_config_ext={0x4, 0x489e}, 0x8, 0x8, 0x9, 0x3, 0x6, 0x5, 0x400}, r2, 0x0, r1, 0x4) openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) sendmsg(r3, &(0x7f00000017c0)={&(0x7f0000000100)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000000380)}, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001880)='cgroup.type\x00', 0x2, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000080)='memory.high\x00', 0x2, 0x0) write$cgroup_int(r5, 0x0, 0x0) 01:04:58 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000000000000a", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:58 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000ffffffffa001800000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2000.584323][T21381] device nr0 entered promiscuous mode [ 2000.640425][T21406] validate_nla: 7 callbacks suppressed [ 2000.640438][T21406] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160bfec000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:59 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000010", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2000.919083][T21417] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:59 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000100", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2001.256512][T21389] device nr0 entered promiscuous mode 01:04:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:04:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00f000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:59 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000011", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:59 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000200", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) sendmsg$sock(r0, &(0x7f0000000540)={&(0x7f0000000200)=@sco={0x1f, {0x7, 0x9a3, 0x0, 0x6, 0x8, 0x2}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000018c0)="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", 0x1000}, {&(0x7f0000000280)="70f101e04b51a795ac106e19b48cc46e28478315bcb6f43e2b1786cae948e4820bb9", 0x22}, {&(0x7f00000002c0)="3ff31310194714c81a14ec9e426395fde484c56e35be0c602ab0fdbda08f5d0a016432be8ee1c25a85492be5091d727d6b66ba11d7b65085985783278da11970", 0x40}, {&(0x7f0000000300)="bba79dcfa263201dabe154ed3a793579a3f5d0657c22e4a1513a61aba27d25dda468ba4616c6035e7b4b7e33da547a491d94bbd7cdf3e65f64624591d608948db9cb5e20265feedcb397d5226847b39ef6d7cfa6f3", 0x55}], 0x4, &(0x7f0000000440)=[@txtime={{0x18, 0x1, 0x3d, 0x6b9}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x1f}}, @timestamping={{0x14, 0x1, 0x25, 0x10001}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x74fa}}, @timestamping={{0x14}}], 0xf0}, 0x40) socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)=ANY=[@ANYBLOB="07000000000000000000d5fcc9d509b9233c4292a8ae00000000000000"]) perf_event_open$cgroup(&(0x7f0000000fc0)={0x0, 0x70, 0x100000000, 0x6, 0x1, 0x0, 0x0, 0x7, 0x100, 0x4, 0x6, 0x2b, 0x101, 0x2, 0x5, 0x10000, 0x1, 0x100000000, 0x5, 0x0, 0x5, 0x2, 0x9, 0xf68a, 0x6, 0x1, 0x1ff, 0x1, 0x7, 0x8, 0xffffffff, 0x400, 0x3ff, 0x2faa, 0x3, 0x7ff, 0x9, 0x5, 0x0, 0x101, 0x5, @perf_config_ext={0x4, 0x489e}, 0x8, 0x8, 0x9, 0x3, 0x6, 0x5, 0x400}, r2, 0x0, r1, 0x4) openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) sendmsg(r3, &(0x7f00000017c0)={&(0x7f0000000100)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000000380)}, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001880)='cgroup.type\x00', 0x2, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000080)='memory.high\x00', 0x2, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 2001.599378][T21442] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:04:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00fc00d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:04:59 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000300", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:04:59 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000000000003f", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2001.738090][T21449] device nr0 entered promiscuous mode [ 2001.850561][T21452] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b80fe00d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:00 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000040", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:00 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000400", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2002.095150][T21469] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 2002.424299][T21458] device nr0 entered promiscuous mode 01:05:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160bc0fe00d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:00 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000000000005c", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:00 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000500", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:00 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'/r0\x01\x00', 0x4005}) 01:05:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2002.625512][T21485] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00ff00d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:00 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000ffffff8d", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:01 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000600", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2002.865427][T21502] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:01 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000008000a0", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000200d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2003.117822][T21503] device nr0 entered promiscuous mode [ 2003.174643][T21528] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 2003.239552][T21517] device nr0 entered promiscuous mode 01:05:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2003.559769][T21529] device nr0 entered promiscuous mode 01:05:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:01 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000700", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:01 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000008001a0", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000300d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2003.675445][T21543] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:02 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000800", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000400d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2003.793748][T21551] device nr0 entered promiscuous mode 01:05:02 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000008002a0", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2003.976178][T21563] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:02 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000900", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000500d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:02 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000fffffff5", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2004.510978][T21561] device nr0 entered promiscuous mode [ 2004.523994][T21572] device nr0 entered promiscuous mode 01:05:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000600d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:03 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000a00", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:03 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000000080fe", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2004.782650][T21594] device nr0 entered promiscuous mode 01:05:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:03 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000008fffeff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:03 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000001000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000700d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2005.151695][T21612] device nr0 entered promiscuous mode 01:05:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:03 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000001100", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000a00d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:03 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000007fffffff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000c00d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:04 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000003f00", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2005.819458][T21634] device nr0 entered promiscuous mode [ 2005.833689][T21648] device nr0 entered promiscuous mode 01:05:04 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000008dffffff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2005.896016][T21658] validate_nla: 4 callbacks suppressed [ 2005.896026][T21658] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 2006.224907][T21669] device nr0 entered promiscuous mode 01:05:04 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000440)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f0000000400)='threaded\x00', 0x9) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) close(r5) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000003c0)) socket$kcm(0x29, 0x2, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000380)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x8001, 0x0}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r7, 0x28, &(0x7f0000000480)}, 0x10) close(r1) write$cgroup_subtree(r7, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)) close(r6) ioctl$PERF_EVENT_IOC_ID(r7, 0x80082407, &(0x7f0000000540)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x8000, 0x0) close(r5) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={r3, r5, 0x3, 0x3}, 0x10) 01:05:04 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000004000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:04 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000f5ffffff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000e00d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2006.491075][T21682] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:04 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000f00d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:04 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000005c00", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:04 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000ffffff8d00", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2006.808374][T21705] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:05 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b001000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2006.859078][T21683] device nr0 entered promiscuous mode [ 2006.918575][T21701] device nr0 entered promiscuous mode [ 2007.040366][T21720] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:05 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000ffffffff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:05 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000aaaaaafeffaaaaa800", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b004800d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:05 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000240)) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x3}, 0x2c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) sendmsg$tipc(r4, &(0x7f0000000480)={&(0x7f0000000000), 0x10, 0x0}, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x6, 0x8, 0x81, 0x1, 0x0, 0xff, 0x44800, 0x8, 0x2, 0x400, 0x7, 0x6d2e, 0x2, 0x5, 0x4, 0x9, 0x3, 0x6, 0x3, 0x1, 0x6, 0x8, 0x81, 0x5, 0x2, 0x4, 0x200, 0x6, 0x9, 0x7, 0x6, 0x200, 0x5, 0x9, 0xfff, 0x1bc0, 0x0, 0x6, 0x0, @perf_config_ext={0x6ff, 0x5}, 0x80, 0xffffffffffffffe0, 0x1, 0x7, 0x3, 0x5, 0x4}, 0xffffffffffffffff, 0x2, r1, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r4}) openat$cgroup_type(r1, &(0x7f0000000340)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000780)='threaded\x00', 0x9) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0x9) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000380)='threaded\x00', 0x9) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={0xffffffffffffffff, 0x3, 0x1, 0x4, &(0x7f00000000c0)=[0x0], 0x1}, 0x20) write$cgroup_subtree(r3, &(0x7f00000003c0)={[{0x0, 'pids'}]}, 0x6) 01:05:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2007.412900][T21729] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:05 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000000000aa00", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b004c00d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:05 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000ffffffff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:05 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000003580)={&(0x7f0000000140)=@pppol2tp, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)="b2df65ecd2f19c0faf038bdd549d6ad66632c2786e958a41efc8b2e82a33a7df48e59edf", 0xffffffffffffff5d}], 0x1, &(0x7f0000000400)}, 0xfffffffffffffffd) r1 = socket$kcm(0xa, 0x20000000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x23, &(0x7f0000000280), 0xcc) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={r1}) [ 2007.751479][T21753] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:06 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000a8aaaafffeaaaaaa00", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b006000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:06 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000ffffffff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:06 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x0, 0x0, 0x3, 0x1, {0xa, 0x4e20, 0x7, @remote, 0x2f8}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000140)="3862dbb945a2ac3f88bc7a3eb7387c48aa72083583dc98efb277cbd199d208fef45a50c328d098e0ce47eb2b18f95c0c6b1fbce265a326cd01e40065a59b18f1e4937b2cde9cb6d50912506c9a63c37d61189f435c9959dae6088296cc2b6b93426f330f676700f906a895688e0416d734b9583f02fa12206be39c57250fdc7b608caecf872a7c5b8720db46df74bf5dd64c69fbdf9f8428a25525c84f9742e1396c8ce6c958a04a5fd13890feccb365cd58f47d3fa6068883381504dec50d013b3406ef16d5d438f87219270b", 0xcd}, {&(0x7f0000000240)="55064ddf630ddf3ef016ef77fe10d47a890da737c1132a20322fedcdfec01fc49019610172cd812ee56354de5cf6ece6da0c931a32ae614f7d73d13eca127ce17974154bcde45ef919185f7a15ab20875b2eff4ced0bb9c94a4314c9b9675db6", 0x60}], 0x2, &(0x7f0000000300)=[{0x38, 0x107, 0x80000000, "76bec351dca1b8d7f45fa5b9384250d75d5e4e9c7b93c41ce679e5a5bf2fba21e0841fba03bd"}, {0xd8, 0x13f, 0x1, "83ad3473153c115c51a1c6c8a16e3698737b18c57deb12a838a5eaa5cb5c08a06c04cece769c8d6629a00dc3ea296f1088df4ba31dc6d3cf48ad8cbc9482b76711817d1034b3ec31797e71bf1d8593a0a76cc1512ea5ff16fb56338e5ea927f925c9b47e3b69ff9454aaf1e971483d1c4eea0b2b9c96c164dc9db86f3a523a9e69284436d5787f5d453d226b97bf64ee23e33b5027ddcac7a415ff63f088c853b36d9a041475b26ed0e3d038378d6f56645d90b7bed18dc5579d567a743c4960c606"}, {0x70, 0x77c67b4f16c633d4, 0x4, "53e0d6b938ea9086c2205c4a256adf7d82a0c779eb3b069541ff6b8d26611088393817933f27d24cd961b89cdd3c786493e9b9a2969bade05a0138539d9b1b0cd0ff92ea544515415d273d744bfdd333c12a18fd16a2e5c662"}, {0x1010, 0x10b, 0xffffffffffffffff, "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"}], 0x1190}, 0x20044001) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e000000130081c5e4050cecdb4cb9040a485e430bffe8f0000000f90006482cff3de1ae6f4ba900b0ebe06ac400", 0x2e}], 0x1}, 0x0) [ 2007.950644][T21755] device nr0 entered promiscuous mode 01:05:06 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000fffffff500", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2008.084828][T21779] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:06 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2008.494911][T21773] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2008.530237][T21798] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 01:05:06 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b006800d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:06 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000000080fe00", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:06 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r0, &(0x7f0000001340)={&(0x7f00000000c0)=@caif=@rfm={0x25, 0x8, "f2b435d0e03df39771993ad8f4537ca5"}, 0x80, &(0x7f0000001300)=[{&(0x7f0000000140)="9260d0acb0fde53f8381b7746fef97d454d82efca9911c7a4d0a12e1e892d086eed6e50942e1ab1b237febc05ea720a46296f52cca8573c23353735c9b49e7f0272e5d3fa275bd369be2669e1fec7aeb20e81fb930ae87d1f7910c68cf8b533c0579ded7ec114bc2c44d3d7700a01d2362f9b261085ee550db22871d541b55e1258a1c6683038f301069df3eff722f926c32c874b45ada54bce00af415ad887902ede4557c232dc3a61da6c3761f143c60baef18e258e742af0cb2b5aafbc44ac0f76dca1d57d596a11fe3bc5194e10a95bd9aa5cee60713117b3594d4edc4edf97d816362290c835a4e015471e3c99117c1b1ca8c7930ec", 0xf8}, {&(0x7f0000000240)="d8313e330b3cb51c13ac35e46c45ac71fb782ef00eabf3abb54cc198531a9f77f44d2aaf743f8d42370e44da20aa2cd560027ee4e6a9c0d34c5b32aab7f118f9a4b9392e1bc3f92c2df85e50e4603982f21301fdcb2475c3907f10817a0685996d18097aca3075e495b74ba9b350909c671a3d8e23c7e60fb43609e5a2fb1491c8549b81d96273dfff16fd8a", 0x8c}, {&(0x7f0000001380)="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", 0x1000}], 0x3, &(0x7f0000002800)=[{0xa0, 0x3a, 0x80000001, "386e3f2cea21374781db819bac44685c711915ebbb8130fbafb0cf1c67821989c75f80813d454cd07331844adae2c56a3bc91760c65f6c82f69704964afc6844432f0d959ee7b964dc32893d9dc34aff8198896917457a1700bec28a6d3d2732099b8427226045323911cc5a4dda576f8f4f3724ed81666fe5375fdf5d3c6c92a8df40124c6667492a9b14d9d7"}, {0x98, 0x0, 0x7f, "e73a576dd02c96cfec3974cdd4c4d33b6272f849dd5e4d80402eed98c9b82cfab8835bcad0bdda142a2e1bdbf12d64a5fcdfcd5da3e30cd3fe9d9a7c98a35ae219262f4396bea45ec15ae781b6b895abf16dc4f497b12b910329f7a8356315fd3e93727279f6bba445949025d3bae82d1e71a0e83773738b2adaba9497528e1a5ea8b8b9"}, {0xffffffffffffffe7, 0x0, 0x3, "baf39359f07f9d788c11daaedc1278ef1c9d6b548633f31ce99636551f2f5057ab230ac212a908756718d0f6efc6fd86195e2228632a49ee531ccd2620fc4eb74dd4c477cf43bef2fcd82beef99bc81ce62a668873cb1d733af4c17c5d20e85a2c149a8d5bda17620c50b6c4ce3734f57fa0dcd52fd1d02131f7f0db428b128234f0fd11e40c44b93f55b45158d707717bbb6e08a2c67d4d9c221c8a777b33664c1292d7eda7666b1c46d4d0bfbdca9072b9b7b74fd3fc954411bf1bfacc626f47a21aee720327c4f7d1f36737b625fabf294a38be4d68"}, {0x90, 0x10b, 0x4, "95c81c2c72418eb5c4e4454b455597fe1b19af66af3e6a53a99d28476bcb7d02f0a78a19f65032bb4dc47c52e0dcc4334dcea29898d382901b3c890557862574799e3ef810e84a0dc13099e60d8900350febd3d96cf4503f351cb01fbe61e0fea9ffd78e57b08de73c0bb7cfe848847546ebab400b859f8b6f7b"}, {0x48, 0x2f, 0x5, "a52f8a94bde647c6af0b3292f12513ca5193e5d263d51caee47c0e5f6c6e946c30798965aba357fc4bf1bbd46f7a82e1725e4fd67ff967b7"}, {0x80, 0x10a, 0x5b, "c29c69b4ccbcf7ca36cd05a3d7aeefb410d10a31f7bce353cb28ab7ee7400ffefd7829bac5cc895445dfd4535bc7bd2cdc058beacdfa8bbd30072bc7043c21f562dfba6ef90465fed55f98da06866bbdd0a0d673afeb5177cc78bd9373823d07ed2535cba14de4a331343e48"}, {0xf8, 0x101, 0x1, "8cce32f8426553c329d6ab87c471ec1b55c5b8e6eb1835b4b42dde9de60353cf3aa772d6f823464df81f2afacab303add8c089b66380870ea2ebd2d851e272c37ba174f5e4643752e6337c9de76af5abd40a24cb00da8f956ffa4fbae415916bd1721ddb9b678c2c9b4783abd0eaef7ad10ce039a95bc2b03a569985b462f02cc1c2c0ff9362765a0c6057eb9e9ce0911e36684bf1704e4c65880f8caaf695c9674a52a44e2f12f48d73bdeb45c78ad1d39212259c4adc76d81c528a0ffb5eaac3de6e618a9914a910191503e37707a63c032e84ae55c7ea21c69970964506818cdc53a63ccbb420"}, {0x78, 0x84, 0x6, "a3a14ac80d01a4339d37d350957d6ebb3c56a758f9351ab1bc4a43c8c93b5f32c58d8060f921348a9e1d9b3e917c9a96cf5b8102188a764269f2c3e33249a86638c28b865ed285b74bc8c822111ece2bdbb031407c76d8405d389755a4c34e87afee43977cfc0a"}, {0x1010, 0x117, 0x8, "f9ea77e07cbb7f53cb221a6c068209af75d3817cda7da05cefa8515bcfb5df1037b2723e2292a43c844b38b03609acaad46dfbfa97cfd3c3ac05962fb64427f1f1a9f37cf01ccd73f2bc45d59adc44ca62f96387734621c161766e4ee2f17f9431b70def6182fd2d67f7a99c7fb3dedb0d7a86075fef94fd4a2fb59bbcd72b9805fad29c8d8935da4b12c278561320abdfa2630f8f68fc85cc28050fbb6ec9f546f542b3329ab0fd0b5b49f81081367cac55fdd7dd984fceb39635ebf0f694ab28fd5d568001fc55ad8a81ff95a5bb19dc1f11e2ff3a929a56e135fadd053b4919d255c2bf39eefdeeb26cb3ce0ce56f893acbebcd0007138a8c501dbaa731a9eb4026e07ffe132b140817418a2e70db3fad9ea4bf1aa283a69a5dc2dedc7a2df6c2cba0a7d447535f9d8111e585185f9846545e11fbe487ae47c7d9252bed11e226542f7635b63db958daa154814401808718edccaa01e3055d8eb7f37678ab568e95ab0b1f170bb1dc477a2e1c9ada56e1f26388e637601d93b86b5d7f4640516887e65f4a8e30dedc4dec0407c99ce6525f5aab1a332b6f147a0ccbfb614fbed32fd7cc7badc3109dfc9722e00b14d2bccd5e05bcaaab5bb51f2866710ccf90556516ede17cc7d55ad2381974a4ea73121f24eff197415c2e165d523be186cdfdfb680c7ad5c3e38249d89b28cd494abd06f2fa938a837a5c6ea80a7665dfa5a3eb883510c8d14eeabf15aa3a082aca20cac5fd1a3ca4a7ae9fe69d0b318866b6ef089682fdd4cd4f0196856963d9007c7a17686ff758722ec85cc216c595d67186b297a850894bfdcf76c869c3690eecfacb7f2f5da4ff35292325188c3debf86795a94cfdcc0520ca9439fc25ed7fd70a6f28ab7b06b4023716300e2dd28dc91f14f62d23bbab5644ef7409291aae4d621fb6320e3a36740c04302bf9ba46d9cf4f77788d26e8b4ea14e910c5c349225ba21eee3d0e397eecdf88a1743cccdfab2ee103ea11a305529fdb454d194a165dc50682dfc6f68bf58e10450caae445aeacad25cbe3541ea76d7172e7c129310d8bd00900a1ece8920447651e143e8c71388dab9195dfc4557e2a40f21234a27bc92184df7c6783d5af0c3fe6302828764bc6fa70e92f28ae348b59240ea77798ef42291c53b6024ade9bc0b27cab553e3a51576de50bdfe19769a8854ecfa25c53b29fbcdb159b1b891ef913aeaa34cd79c9935a72ac1777b45296f4cbeb8a9c26af4bd0a46763e3a871b32a1caf4b78b24470ffdba435131d9b496dc618e228310fdbb4d20372306a1a621b0b40027dd9556c6fc79311166086752c79425ec79cf9785b9384766cdd8a61bb1c51decd67c135f9eeea81f91afc237ccb1ebe423414186407a55c71af1e21859e81d2fdbc1094b3bda34478fa96d9e1f2fc44a05ac6e0503bf8ce2b7369d3c2a5955809d9067ecd113ee87fb5e5537af0d10beb77f53756ed4bfeedbbf0371083689ab969ab9d4bb5d63abcee24b0295942474c663d5e3ccc184685006f6ddff20ba3e0a56a18edffd6ffdbe507690afd3ab24839cddbdae8427988eb0dce872af2bb2a91647b700ac5d5b1c6c42624dece74f9cb94063802204cfd14c0831e5a81da9233a9ac209df368f96811d48c2a982a62e0213bc972096c91d63361de44379f94bfda5f64ffcfd2e9f9d3decc29f83acdfc09b2116ffdbd343c7912b31871a9f371e8f74561b34e0ba5d9af4e3af35c4ef6133d3cadf022972a2829f609943ed2396137d40f5ee94be5b9473b34ece4f1b3ee1fcfea32af48a9258f9427cccc9318d2540639f0e2e215832e960bc7f1fb27c8438c078f2bc80756599046cf7c39cd7bdf49faf29d9dc8013d505b9ac560bfeb8b634241ccc9cd33305a0e9ff1f4f98b084190ebbfb4f773572e0824182eb0ae6bb9dae76904224b257d4889acead5e45f70baac97f8b32c00e1bccd6e854b1644f7d88e9a85bd05aa574c0645c0c0c504f0672ace80896ee492c6d11acad55dc600d69f3e479429c4513880d664b4388f21d451eb04fa7eb9b0ade693f3465f963b7a9beb5c07f2e78c765ec6b4978f6424bd87747187d26ddd9ea20ed0a2bdb89bacc496f67d5904cbfe866b0f93661218e0e2043f327396ef0eecbc6fe2151509d7828e546648d4537c3669bd46205ee662fb480fce1e5209d78694688d912ee78ab05cbf6c773e4ae8ea9558bd5cc13177888945c42bd325ae0512b04ee6dfe7ef56634dbcea87dcd22d978170539f490686b9c65fa715235752404bbbd9dc44395e17321dca35fcc3612df2342e7c7cf8c2671ee976c5154e537524df0d3b4cbbb99a53e8ea3d83495686d731e862face124a89a96d2f04999452acfd1e01d108aeb0cff0f64dd79d69b1bf34ed4bc6d7d67a234efd33c18ceac810318f1277634edad712c905e4a269102557c1d0a0004f4cb1202e17c55beb5891489ec76645098489310bf1c75f793542794fdd568f14bdfe0752e62e6328e84c31ce2f85224d74da739351da26ae807c49417915d9aa6c87274414fe4bb70465c6f931cee3202f8488e0d26a7b807a055185d7909ad8bc02991cc5793e45388b6bfb986f22991fb36eed21ddb9ecd74b1286baef45d9a249060326bbc8b71e4b708f23897bb5cf62ecef3b3cf023e6581e0fe016341b412cb54c6141c4b55d54ba78bb830c238b6e7543060ce4cb8d429fbf56353f59566254263b981e0eb645c2bc4ca43b9adb18bcdac83da38b884b38065f92bcc862a743472556fbb598626e9fa725ae40db9d6f737b7b4b38d59df491ffcd24fb468d0312aac2b110ee5c3b9cb9a82e9bd50ab6cb8563cba1ab18574d8f2f90148a0ef7169db89879430a9f404fb4f5cd5c5228cca41eae3a8c9c84c0f004d60d516f592c43ffc1baa1c7dcdf7df3b0c406747a0fd18a5c126b9cf52b1eef555891b757f5be710d89511dc20a20835431ce395b9de7c3ffaa55cbf27e13795227d9512705dd30c9765bb96027909172d32d0892db57a2f23275656ccf768684c4c59d813ef812c3858c74e94df76bc690daada3f496492b590d1bb17caa320b95694f9a4868b411f77cdc287fa6468ca3a6134cdb020ec5b59027996205522af5613bbfd2fd1f90e3d74325144a98f1d4fa80717843e9b828a8cc91ea1b9fe8155fc5143589cacfc15cb5aa2fdebb86be4e2f774196f41938e71f449d9687bb79247f77e6d01ff81e4ea936591e98de41e47a0545ed3a224a3978f8eb06278a70f1aa505b8d3009774abe2c97375452b0e463385f10e668d1e0f889ac7f7d43fd7627a291d42c75b4a3b43abd9164f9dae1c3c248bc1dea43cccb6ca060b0981230d68b42cc4bece8f7869a220336c6c6014ce578e004de4af3a5fbda3d6a3bde5b554da6daa359f6983c5f9e9d5aa6b4494e7e54a973933d8bdef9c0dd9244829273ca696ed58f63e479164aebcccc2a49d73dbb2522a1e9428f62e36eec1f2eedad177397cbc5e40100b7bceb8108f9574d2afb0eee43763cf553062b7eb43201b0ccd2b9089e167d62454c6e27c37384d4081a416e965d04fc7401651d14dd21a355b2d9b402d07daadc9042d1229691e1593f2473aa806a86af95ecdb6041e827c12a9ce9f0baaca8189f10b468650e601ecbd7d968df143f4f2c645c4f993ee876e321c2f6572e1c954255ae1919072df328f5a0ce21ccfb01c9ed227983e8d8d95f0055972e4d6c0bbc54567df46558a22f617b8678857b468a26da4317365b792977a1bf7f11d08479ceee2f4252d5641e3136b5c5928d677e8df3b2376ba0433cc5b7fde55a4de81a4432c313bbee11b22d6d7fe42ed7f829c33df3a67c70dd1aebee99fda3a3b6f375e0c04c377f886e1589fe3a496dcf2d436f46ce97d98c230ed273d0ea25434a71f10f8ee0a5a4631ce461ac312fdfef7f79bd2cc21e1d71cf526513392c7b1b47f1c1baf06e7f58c09f6a92f7170de2e36dc684d150b3575fb45782c4909bfa2eddaf5bc15aa00514541298863d93333ff8c9c72a2295a796a69ac595bf6e2de7eb1a9ec8b5290dd73afade7772b92bca10283d987f13c347edbf1cca03551f61cb635dfdee1dc799229fd1a6465711e3dec66f9fb5b430606bf2d137b1137edf798b287b6eba890fe0739f789a7c04f712eba569f467394ba7eb5979cc4bf8e286cd94fb2de9005ab0fac9b0c7ee49cadd45f4e94731ddfe1956776ac9f9fc608904f5f262e9be1eca388da29f7ef45db1be1ba1842662116f7f9676a90b6d88e9238f1c152e3696a10ffeaee3e620dcb673a202aa0e1239ac484626477acabc4ca40704ffd94293703ca8a29c10e9076620ae6707e1162486836c93aed4f864ec671ed2fc4bc245a22a93781796c678e20fb00b8e2d590db26b8ffbcc8a015b026b4d9c333dd6162d049ec10ac0d44bfcc83b411e6703c2da0a77895303fcfdeda6b91ef1bf3837f26e29a37a9841fbc20c4b85bf18bab08adc4c7abfe667c54b44d5cfbd818b0ac84a061186dd78db2e12c911f252db4b0638a1bb0dddd1b3102bf3d25d1d5dd919c8b8547a96381a5c0ab66cd58ce956f2df4835bb83429f48d2aa4c8c7792588492dcf2b15420d6a3a13a516b8b615fdd494a5d27184ce28cf311f106a25799c6351223dd2799613a218f306052f4ed94876a4c97fd2b53a0c92f90135c3c80b990771d1e713d08b0f22077e119c5312d6edf4c598f85c9c7b3572ef075f79f22c0ccd962dc1767aabafef85f1f5a94b87315b9bb6108b78771f055b0f14a3e6e5f9cbfdabb097b192f2e6bb9a40c297b403dcb3c2508c60db7b8a9c17628a22d6c028f9636e669c371780ad1481fec8f7432b93e74c71faa1dcea625c52c0ec223638a0df325608e136ff865651732a48ee0c57fb4c563f5cdda7f3aff2a1545e4af147539a8e1db4dc373e520644a983693bbaa9af8037db908a48a9c260cf6c4868e8dcd672166b7715f01bdd7fd4a56c98d0630339962cc1da90bf59a41d37cc2e5d92b0f5fce315d05593fedfe851faedf6ed60a202ecf1cbc1961ada4e75e37313ae0c8099894b277c2f05a55d730fb40161bd1c70ca6e58261a038906aba107eca4ded3788e354db545387661fb83775e5d064008b3ad7142695b6fba3b721f9a0db3ebe2b29739a64c32af686b485e339a577551f20332e45fc387d6624e2dadb262d6ee6bb1ebf8ad79aae2599ffb1638e9ad3d0e2447556948ec11722ec494f04eca92f5b285cd37ed2df79521f2f140f4e28ccdcafa3353c7c4437434fea865400c12b310ff8e73ec20520bd6e031771369588946cb5331e5857b8c2d90e54ec95ba10c93ec7bd444db0e9423e4575f592b2653b872fe08dc7a0485167506b7e0b62ac2cdd0ffce640a07a7538d0c2abde1f8ac203ba23b61907c73d742975a7f1662ae53bf24903b79f832f94f3b57c7f10db42e13fef5448dfe8b322ad9437f2756946f7510ec2ff15dab41737961730792a99d45a7eabec4e9c31dc159d7e319f221a6b37661a824b830d04b8f6cc2edf875bba86f7a044e387fdd2a45577ad2748409815480b2e65ec45703b6961f0f5213eea0f358277bd6ff273628d7bf6458ecedba395b02847342cdca7ab58bc741a1fb0d94e1ebd413e1611faeb1e8a6857fb4769484266f885740e8c108e1a0d78e3dbd06f0fe0ef71224d053afedafa07019f3efd520ae7ccea7b18821b0b40d7df6f648dea530fd44dcc4c389a5521c5d533ec94f8c06c2e2816e70431e1012f87ab170f26fc86852a"}], 0x14f8}, 0x24000054) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000370000004400"/24], 0x18}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='pids.current\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x4, 0x2, 0x2, 0x2, {0xa, 0x4e23, 0x0, @loopback, 0x8}}}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000003c0)="78d876193e62bde99776a7685933f27c827f65e301384baccbfe56257d83ea16e89e8eba159c791443f6c4f94b9f6274aa888a298d6680bfcc1c674eeab23dfd00c997a366a80abe068871d3b094d4d1abdd4c77f5d28b14220ab934cb1d6fc53a9b003c43e35fc9cd62f37de15c87c322fd75786829103df7af7e129d3b05f20d323e809256d12b1c44f42ea01f4001164ed903690733df", 0x98}, {&(0x7f0000000480)="694d0b5928bb385ffa480bdc20f9f0a24f331653ce0321", 0x17}], 0x2, &(0x7f0000003d00)=[{0x40, 0x18f, 0x8, "7d811e97ebe987497e48cb6c5d9c42c501c1af42c2e4b37372afe27486f2dd0dc946ab31208850b44399"}, {0x68, 0x3a, 0x8, "79c2d1c031decf3630d220b29ba800c47fd1bbb596754d37345a52b9d0c312add197ea4f0b85c952bc05d864929e9dea9c4a1cbb962fd9020f1c49b2c99e445815b1b5e05d9b41c8684ec24d8abcea21a0719894e6"}, {0xf0, 0x100, 0xa0c, "e820c72df8fcd4612c8b19607ab8ef0ca6fad2484fe661df24d9e4e05a4cd98a61a0a108e374ed68ffe7ef1a1d45dec0aa8f08c26bbe0a222b56126bf00e0fefa237c19d3f91f9689ff93a0917ed1701bb121aaba4f02feb69179a009aa8c387325fecf447bcef87ce6c7494d9543c107a313096c3fb8506de89eb59042c36a612e50ecfa8d17875c829fb324ff7991d4ae465b1cda80138f49d4c2dfcd071c08f98fe184d575e6f1059ff98fdab3976892353688f10600e9af106dc2ff0c7c57abf882911e82898ffc9b87c4bb2db6c0395c178cfda9ea9ac"}, {0x1010, 0x84, 0xffff, "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"}, {0xc8, 0x13f, 0xf8e9, "8d0d0f6601a8387e902ae6b2ce5353905e150f8fb51d6ac1c176f5b608664715c27869e72a385ea19fcae4a81188b144fa959a6e579e24da58974c2d645a3efae021a82a4fcb5f15c535d68d9cbfa5391b8bd26ff1357c28302f9e16260d9223950c2f13cf6c14562c14a46b74eb9c980da8afdd6a1101f86525446343a4fa9512014641e3640810e33615faa1dcb8f8d5e4a85afb510c412ae4aaf05d6eff15c2ee0e5bdf80ad7307e782221ca922869511"}, {0xb0, 0x118, 0x1, "ab957f2a3799ae74fd3b82559b164251f2f36a0b4f029872566aa2d05270b193b67256bfe7d55960a5e847037231ed601c0a2ed560f687a534a87f27d13d0dc6c2591020a1ba9ed58947751840101fe4744df056df0fcb5b19133b4847a44fcddb514e01a222fa5d45611892271fdd31847a3e3529b764817d3d8caf86478a4a0fca7e1be4dfe04b40bb1d000b5dc7c2385a66c4f682d967339d764cd585724b"}], 0x1320}, 0x40) [ 2008.658067][T21806] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:06 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000007fffffff00", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b006c00d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:07 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2008.896385][T21824] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x4, &(0x7f0000000140)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x28}]}, &(0x7f0000000100)='W*\x00\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x9, 0x1, 0x800, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffff9c, &(0x7f000000e980)={&(0x7f000000e700)=@can={0x1d, 0x0}, 0x80, &(0x7f000000e900)=[{&(0x7f000000e780)=""/114, 0x72}, {&(0x7f000000e800)=""/75, 0x4b}, {&(0x7f000000e880)=""/77, 0x4d}], 0x3, &(0x7f000000e940)=""/32, 0x20}, 0x60) sendmsg$inet(r0, &(0x7f000000ea00)={&(0x7f0000000a40)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000000f80)=[{&(0x7f0000000a80)="57b55fdfea81e59d423fb8673f739ebeefa0016292d25a8a119cf9deaa0dfa2e4739001cbc9d37a65584a9b2bae8a012eb24cfdacf97a1d0ea8d6663afd71a835da04fa715e36dd28fe7f41cbec5d42c4ac4d4223515b587fcf3efce3567f742637e5274134bbd0fae92d9c8c13b2000d26b2940d3c9c5a47d64d251bab71188ea558137cdc8a170c892acf12422547d9ab00ca57293ba9052f83ee8fe90d212901e558416c3d15128961cf886fc6b4f1f8474cb5346424bc8356b120217333e04fb4f29ba8f108a9b1b184f87bc1cdc98fbde66de5493668af0dd2171dc42f8215de7fffb0607c28e", 0xe9}, {&(0x7f0000000b80)="2cc100b08060e10d676cd36797c4ac8c80e13738bf1a585dde479000303fba5061155db05b8332dfcb7be224249ba959090eee86c901849530f7e127967b740044134c05c4022c26fc47c5df6aca6b5b845b2e8022a5e6e3877c13cea361274b1b795476cf9e1a6c53025a287caf11633fd9c1cb20158612b03ee6c0f4009f344e890f422d9460ab02f5d5901653be3a52028ad49bc6459ab7f22c83cdfef17880afff70cac7af2ebbdbaac2d120d80fe18802e34a000ab460ad7fa8754335211a3465e3fc613e", 0x15}, {&(0x7f0000000c80)="dfa14ac8c7eb7eb0710de851a8e87ba79d2e85481552cb836e96bbcac874d4012939a3f6196d1cbdea1cbdf1", 0x2c}, {&(0x7f0000000cc0)="d66d851c3ca7c25ee3f0fef94d58766f10668c4b66b5f3a639694af309078e28b0ba2163244425f9db6218d0968eedd936f5b5318d8510f96b09297d0e8a3eb672b4a5bc159db8c9f69464a7cb2773f54c6a938c83f362c0eac9586daca8d3d9e63e4b64ef632648c164fa3e8544168fd7fa9939104f305d3662ac2c2f7d05ee389f9c67341650d6dd98b16b217718e50ac9f75ceede4a4248b8577c2eb01d49399c2b15bf067922f31575f96aa0153158c316103461a14f9b335d101a6ec41228ae3aa9c63c96d4b5b44ca71e223fca16347b9b64126a881276c9614fd552f1a13b8e34239188279fb1437811917bb2414b1b925899d009dc", 0xf9}, {&(0x7f0000001000)="3d02963c7571f2cc50e73d8f713b85cdc997295fb466c07d5b25a65230f6801d4fd16f3a40618e23675f3cf0118888ce67d55ad56afb8356cf36463c2d19671420c0497de9c190d049dc0dcd1547a1255c7468924ad83f959a370e950cefb6c18ecb227afd0ff832674a2024c09b4ab84eb9103fac4ed610117be40780f9241497e3235d20d82ad8f361b046bbe6be305f0e4980d05dc438118e1f5ec56461b2efb7a810c6325f73d0ee225e8e4e7d59a955ac640f1907f5801b8ad55173371adf4e28924426677737807c1aa41102fb2b87c2c76c502beabb2a7b709681d5612e30d37eb0d6297c3b9861f4", 0xec}, {&(0x7f0000000ec0)="5dc2fbd748c73251e2f35de48bb2744d09beab496ea8f6de38dec5191984d11a7f094dd6209c6bbe71e7384312a45fc8c592548586d77ef7d6de5cdb04b37c40dab813f3e15cf5b59b19e2ac57ea52deed611f70d977505101729881cc6c2102caabc3d531dd94954ba6226487eab7f9cab8320493dc276d3f00cff57b3d5c95f1850be8031a053a33e08a5a5fe75bf0598d0a8f53bfdce1c1faceb1fa543675bf6a99c9", 0xa4}], 0x6, &(0x7f000000e9c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @rand_addr=0xfffffffffffffffa, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x20}, 0x8010) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f00000009c0)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000a00)='cpua\f8\xc3\x97\xf0\x01\x0fpct.usage_user\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000980)={r3, &(0x7f0000000880)="1f2a6f221bfcf6f4cac23e8d08d00a6d03ac458054a84beb31e2598ee18ad207a42b608a414eb39bf4da70761f62bd28808ca52ef4485f42dc59ac830ee22161574562f063e08ecc6559a7ba3aebede4f13de23236d510ead020505f151bd0f9a030cf862a74a198322374af5356ec3a7fe0e6b98156637dc6cd24aa469928185afe54cd362dffe058bbec93f819f2b6b1b7e43c7213bc012bfb8f6f15608488d81618de0ca7494388", &(0x7f0000000940)=""/27}, 0x18) socketpair(0xc, 0x800, 0x2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000180)="6f8545b2e6e9f801a68f918a9732cbfbd4d272f997a5d8c33814ddeaa7ac58003369820a4e4f67c6a3a500511c04344cc30ea313eab83fa19bd9ab488f40286ef77ac9ebb6141e62f97177d40f41e275a2404c9629e1478e003e5eddb0fa3001cb7fc2040689", 0x66}, {&(0x7f0000000200)="b30bf86f825625687e7c9dfabbc2407fd19bba911b0e66145d113fb2e4a7c95da515aafafd2eef60ae90391ce3356b113de4c1058e0c9905213220b35d3153825fd557767ed65066c924331cf0ac1d469e3bf47c7ec259ea8a00744d8c6916", 0x5f}, {&(0x7f0000000280)="4f5993bd1142859abf673d2a1c2d5228dc9e80cd185104923f69dcd5f4dcff6c2419cfefb4c1b0443b1ee536aa29396b8040ff88ace1c10bae1781703ece1922b0749c0cb960041fb309840dd35a3edbbfeff271c6dcf67b9c486204ed896dea6a866652921bbf3bf2fc84cb8ff6d2431777299657e2d03eb6e257cc95ceaf7d17bd7adcc17b9f2aa656c71516c81eb6db17b43b7788a4868d798dea57713654587e8cb229d6af281d005896e136435dfc55de826be7578cd77c7a6936476654bed63b3d94fb2607b41fba576f4fe446c1407a2866890f238e759e39d082548fd7b570995b9b9d", 0xe7}, {&(0x7f0000000380)="562d83c434f28cc9cd3ebd25bf29c91c63f41e4f34fe58ffab542250712f351ccdb43a53c612a9a969b35fcce05a2306dc556a2d4d379d2a8fd6ad281d60ab53a5251c992ccd477667d091d7bb0d8a9d36775eca066beffb7e34b264454388eca431f7855864317af2b7f099404f5f6e278519302200131955b66848b55eaf3abfaeda73fcb86606aac9", 0x8a}, {&(0x7f0000000440)="2704bfe5eb8e06c009dd580f48dff9a8bc87c87e851bd3d612927232e14c46c151118f4ec9bca559a84d0ee3af1049fa9d1e325251226b4e20fc05d78de59259ba766c671e398736957900892a467a8a6a7690bb1c040ff3afe3ffffa9340fc411bdc83e1d50e0c7b8550222efcaa6d5a64c6fbc2c390fe0313fd1e57165db5ea29a132b618c36d02c620f20f2a73ba25d2485dfa373f0eaee90740d11698062b1e219c49611e069700da7d759140d5d1a76073c4867a8120e3d2b3728dbce5a3d130884f8a87b", 0xc7}, {&(0x7f0000000540)="c64cb7375afbef297a4953befc05fae76ebdd81f3c65ba901555bae9436ca7bdc43804fa7633ffb79d9943b26c58ff9f93e66e086cdbf4c78b0fb38bdadf21d135f65f", 0x43}], 0x6, &(0x7f0000000640)=[{0xd0, 0x18b, 0x8, "2aa10456d30939bd5334f587872e7eec415066745b959d2124fa8118973f7fa98c07c497e6803740da8f56b9a7625869a8a5ce4bb6fb37f7140ccb4d0ca397e10c16b8414ccd5d51eab38d0b6d5ddcc025d43a6b6885de54e56e97a2cf093e99776f2d6220da5a139d706439b0cc840e4814047ba3f2a90d97d094cc8140918cdafec77ad99eee15ebda44a9c4cbb1a20d8f8816d19c7033e6f5262ab087cf3ee22331eb8f15400dcabb37e9c4adc593c47862e3c8693507bddc6efa"}, {0xb8, 0x1ff, 0x5, "f3fa5ef993c2e028906b9ad65dc9900daf551650277898d1dad1570694f20471ffa4f62a2e6a949625cd86476cb12b4cb7a727973906883646ab96a07c6154591b33613bc811932070e48c43773a3042ab9927027ae66f85819fc6e3821ab75247fa9532ecf6e8f2416674d1a52f11b3d747bcc0522c46306fcdd20b9be6c6fdd416a8a61cec77dab5d34009cb537825c1c6207da03e2807e6264bfab64f9afa3f17e4"}, {0x40, 0x88, 0x10000, "7c7fec91603f87596aa1a1cf7ae80a11e394ce650ecd0b6ad80665683e0a95bbf225df8a27a8c474e6b2d1"}], 0x1c8}, 0x20000810) 01:05:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b007400d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:07 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000ffffffff00", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:07 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2009.117526][T21827] device nr0 entered promiscuous mode [ 2009.170898][T21842] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:07 executing program 1: ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280), 0xe803}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001780)='/dev/net/tun\x00', 0x10000, 0x0) sendmsg$kcm(r0, &(0x7f0000001740)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @multicast1}, 0x0, 0x4, 0x4, 0x4}}, 0x80, &(0x7f0000001600)=[{&(0x7f00000005c0)="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", 0x1000}, {&(0x7f0000000200)="96519ad22d98fb9638efe39f3900ac469b67a7ce", 0x14}, {&(0x7f0000000280)="48a4c443d4c909fa3ba00ccb6ae50476f73dcc71472b741f302159b4c7af0b20227d1453c85849cb0b0346ad4753e78c3a8dee1a87111893bff9e5eb8f40ed021341564cf2ce886b80444c2bb7dd453f1e2ea701fc93c9551bfb0d6f3f44d1b5a2cdb8e2b62f2ae2d4268cb0dd6755c03663c501e585835c3cda4ea1b86c821b66763f9fc40899161a6caf3a21bc4eadd5943b850adbb4a756fe1010ebf719039cef3deb3f2d6310c35d32", 0xab}, {&(0x7f0000000340)="750341a02c5bf0ed64fb03a1516a8c9de34686762e6e5a4df32cd4ba9209da1f19108b7c01a695c7b84b22d316dfb33467cf8fb1780c7d0770dd7baa2fe502890448e22b7ae845058432107156034bff00ce55838baa4d70282da7993921c7cd41471b38356aecb25b5b5c92db91496f97465156cc1ba6a17b5156d451f2413f34523f196f62835d0f009bfa278c45fcc50447e8274b09d65d9773bf1fbd696724d78425871ec73a6ccdc743540fefedd31d029ac9db7f092cfd3453c76a96b9083140990e793d6bd2ce880066b8fb75852c91ad141a78901315a12343990abf2dc1d8b0817032", 0xe7}, {&(0x7f0000000440)="45636a8450e0b7ca00e0386cd91fda87387c8db81e3fabdbeb970f68bed109ba4d023b97bfa2e6548236f0ba5e7fdb2cc1e4077879c527e76119ca2b4c329f81a461d191ae0d49837e40b73a1d77089ba7856c699b207e50feb46b12af5b10df2a27361e07de13079375fba9ffe86c3506c4226306f8092d59b0bb6e3fdb5de9d4197bce5df15ce266d341fc7680d5d519244d70bd2b498bba6a6b30c98bc9fde69ba47931a03ef71d98fcc50673be2497ed95f9b9ddf85b3d36ccc6850a82a433db66edd2e7126c7b49695ce8d034a86dd30fbff4f364ca", 0xd8}, {&(0x7f00000015c0)="1106f4285d1e8e088f19a2", 0xb}], 0x6, &(0x7f0000001680)=[{0xc0, 0x101, 0x100, "0be201bfb97fc79b2b9024d20f860ed3d9f8c241032efd733ebb8ce31d928e22619620d5f9a8e134ffa274f68346ebccfdf0f44da8a37ac698e8b4dee1dab218fe14631db74837d640e1dc17071085c0e5fbe08e5ea1b98f34e649b9ee549bf24dfcba1e18b9c5c116d21f5e9ab7955861b4231b3f3ca0ab3f136bd43c5cb88c067de155a8c0d0eb9763e370d6582eae01e93f8fa4881f15bc330831a3662255ed7601e75f6879d6c32fccf7a830"}], 0xc0}, 0x0) 01:05:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:07 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000008000a0ffffffff00", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b007a00d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:07 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth0_to_be\x00', 0x8800}) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x297ef) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000300)={r2}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) [ 2009.740308][T21859] device nr0 entered promiscuous mode 01:05:08 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000008001a0ffffffff00", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:08 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00f000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2010.350250][T21895] device nr0 entered promiscuous mode 01:05:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00fc00d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:08 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000003a0ffffffff00", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:08 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'erspan0\x00', 0x4002}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, r1, 0x0, 0x15, &(0x7f0000000300)='eth0md5sum+mime_type\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x100, 0x400, 0xfffffffffffffffe, 0x7fff, 0x0, 0x3, 0x41408, 0x0, 0x20, 0xff, 0x9, 0x6, 0xf9, 0x18000, 0xffff, 0x4, 0x1, 0x0, 0x4, 0x1ff, 0xffffffff, 0x6, 0x5, 0x6, 0x80000000, 0x200, 0x3, 0x1, 0x1800000000, 0xff, 0xbd, 0x6, 0xc5a, 0x5, 0x0, 0x4, 0x0, 0x6, 0x7, @perf_config_ext={0x5, 0x4}, 0x0, 0x3, 0x3, 0x1, 0x1, 0xfffffffffffff800, 0x8}, r2, 0xf, r0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r3, &(0x7f0000000040), &(0x7f00000000c0), 0x2}, 0x20) r4 = gettid() perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x3, 0x6, 0x1, 0x0, 0x0, 0xc500d, 0x9, 0xbd0b, 0x80, 0x7, 0xca, 0x3f, 0x7, 0xfffffffffffffffa, 0x830, 0x3, 0x9, 0x2, 0x3, 0x0, 0x1000, 0xffff, 0x3, 0x6, 0x2, 0x1, 0x6, 0x0, 0xfffffffffffffffc, 0x6, 0x4, 0xfffffffffffffffe, 0x7, 0x4, 0x2, 0x0, 0x5, 0x2, @perf_config_ext={0x5, 0xffffffffffffff01}, 0x200, 0x1, 0x7, 0x8, 0x3f, 0x55a2, 0x321d}, r4, 0x7, r1, 0xb) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f2, &(0x7f0000000580)='ip6_vti0\x00') 01:05:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000003d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:09 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:09 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000200000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2010.801135][T21920] device nr0 entered promiscuous mode 01:05:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b004a04d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:09 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:09 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000300000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2011.085942][T21945] validate_nla: 4 callbacks suppressed [ 2011.085952][T21945] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:09 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000005d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2011.309818][T21960] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:09 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000400000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2011.488330][T21947] device nr0 entered promiscuous mode 01:05:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:10 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000006d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:10 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000001680)='cgroup.max.depth\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='\x00\xac\xe0x\x00\x00n6\x16K\x82\xe6B\xc3Q\xe1\xfd0)NHzs\xc6\xc1@\xf0\xcf\xe4F\xa8\xfdn\a\xf6&7\x1ew\xce\x88\xd5U\x0fs\xd7\x10\a\xc5\xc6\xe3_k\x1e\xc8a\r\xf5\x0eTO\xaf\x80\x11 1\xfc\xd9\x1b;K\x95\xd9Tb_\x8b\xb9\xa9\xc3\xc5\x06\x8c\x9c\xc7\x05\b\xe3T\xf1\x04\xdb\x8b\xd2\xcf\ah\xf3\xcd\xe5\x9d\x9a(\xd7\xcb\xf6\x7f\xb8\x96uKt\xb4\xfdu\xd5h\xda{\xb3\xba:\xfbB\x89\xf7N\n\xabY\xb0k7q_\xca\xa2%m\xa0\x13\v=%\x17X\xd7\x0eW\xaa\x82\xbcy\xdd\xfdn\xbd\xb9\xd9\x06:.\x06x%\x02\x02$N\xc4\x87\xec\xb2', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) recvmsg$kcm(r3, &(0x7f0000000280)={&(0x7f0000000040)=@ipx, 0x80, &(0x7f0000001500)=[{&(0x7f00000000c0)=""/162, 0xa2}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/2, 0x2}, {&(0x7f0000000240)=""/1, 0x1}, {&(0x7f0000001400)=""/104, 0x68}, {&(0x7f0000001480)=""/93, 0x5d}], 0x6, &(0x7f0000001580)=""/211, 0xd3}, 0x100) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000000)={r3}) r4 = openat$cgroup_int(r2, &(0x7f00000003c0)='rdma.max\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={0xffffffffffffffff, r0, 0x0, 0x18, &(0x7f0000001780)='posix_acl_accesscgroup\\\x00'}, 0x30) perf_event_open(&(0x7f0000001700)={0x0, 0x70, 0x8, 0x2, 0x0, 0x101, 0x0, 0x200, 0x10010, 0x4, 0x81, 0x1, 0x9, 0x3, 0x0, 0xf2, 0x1, 0x1, 0x4, 0x7f, 0x1a, 0x80000000, 0x4, 0x7f, 0x9, 0x400, 0x9, 0xde0, 0xffffffffffff69a9, 0x6, 0x1, 0x203, 0x10001, 0x654562f4, 0x200, 0x952, 0x8, 0x10001, 0x0, 0x68af, 0x4, @perf_bp={&(0x7f00000016c0), 0x4}, 0x80, 0x6, 0x5, 0x3, 0x0, 0x7, 0x1}, r5, 0xffffffffffffffff, r0, 0x2) write$cgroup_int(r4, 0x0, 0x0) 01:05:10 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000500000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2011.814029][T21974] device nr0 entered promiscuous mode [ 2011.900778][T21985] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:10 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000600000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000007d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:10 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2012.067464][T21998] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00000ad4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:10 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000700000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2012.260446][T22011] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:10 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2012.507950][T22004] device nr0 entered promiscuous mode 01:05:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00000cd4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:11 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)="130000002c00815091f900000000ff00000000", 0x13}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)={r0, r0}) 01:05:11 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000800000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2012.955704][T22043] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:11 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000900000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:11 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00000ed4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:11 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xf, &(0x7f0000000440), 0x4) sendmsg$kcm(r0, &(0x7f0000000a80)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000007c0), 0x1a0, &(0x7f0000000880), 0xd}, 0x0) 01:05:11 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00000fd4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2013.274099][T22068] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 2013.300876][T22062] device nr0 entered promiscuous mode [ 2013.473662][T22078] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:11 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000a00000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:11 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000020d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2013.783441][T22089] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:12 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000001000000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:12 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000aaaaaafe", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00003fd4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:12 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2014.041471][T22108] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 2014.070981][T22109] device nr0 entered promiscuous mode 01:05:12 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='notify_on_release\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x33, '', 0xa}]}, 0xe) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={r0, 0xe, 0x1, 0x9, &(0x7f0000000000)=[0x0, 0x0], 0x2}, 0x20) 01:05:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:12 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000001100000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000040d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:12 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000005c00000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:12 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) close(r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, 0x0, 0x0}, 0x18) [ 2014.704486][T22133] device nr0 entered promiscuous mode 01:05:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000048d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:12 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000a8aaaaff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:12 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000aa00000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:13 executing program 1: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='sY\x8d\xda4', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0xf0) r2 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) sendmsg(r2, &(0x7f0000000300)={&(0x7f0000000400)=@caif=@dgm={0x25, 0x6}, 0x80, 0x0}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd69, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x311}, 0x0) recvmsg$kcm(r3, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000001880)=""/83, 0x53}, {&(0x7f0000001900)=""/209, 0xd1}], 0x2, &(0x7f0000001a40)}, 0x10120) sendmsg(r2, &(0x7f0000001840)={&(0x7f0000001700)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x0, 0x0, 0x1, 0x2, {0xa, 0x4e23, 0x0, @remote, 0x4}}}, 0x80, &(0x7f0000002f00)=[{&(0x7f0000001800)="a216649b373c34", 0x7}], 0x1}, 0x1) perf_event_open(&(0x7f0000001b00)={0x7, 0x70, 0x9, 0x3ff, 0x8000, 0x5, 0x0, 0x7, 0x402a4, 0x2, 0x3, 0x3, 0xb41a, 0x2, 0x9, 0x1, 0xd6, 0x3ff, 0x7, 0x86, 0x6, 0x1, 0x9, 0x7, 0x7, 0xcac, 0xd36e405, 0x6a456282, 0x4, 0x1c0000000, 0xffffffffffffffff, 0x8000, 0x618, 0x37d, 0xfffffffffffffffb, 0x9, 0xb5e, 0xfffffffffffffffa, 0x0, 0x10000, 0x3, @perf_config_ext={0x8, 0x77bdec95}, 0x0, 0x10000, 0x3, 0x0, 0x7, 0x4f6, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0x3) socketpair(0xa, 0x7, 0x40000, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="850000002ed40000000250244fad3cd4a0f147ceaf03785d815c10000000950000007163de05fc112be554a6658cb080d558917df463d0e4a17c5d64d3d3dcdf052acf0b66fcdf1ba59775f20252ef03"], &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195, 0x0, 0x0, [0x42]}, 0x48) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r5, 0x0, 0xe, 0xf2, &(0x7f0000000080)="4a128a9424c4ffd2e92910150f7d922d3efcb93e53954d00"/37, 0x0, 0x1a4}, 0xfffffffffffffe0d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000700)='cpu.stat\x03\x90[\xfd\x82\xf89\xfe0\xed\x05\xb7\x96JU\xc0\xd9\xdc\x123;<{\xaa7\x92/\x87%+W\xf2\nm\xa0\x19_e\xa0xq\x9e\x7fF`\xb6b\x7f\x18\x1d3\xc1\x00IZ\x19Wz\xa0\xb8\x97\xab\x1ew3J\x93\xb7\x00\xcdhvs\xd5Znj\x19\xc1\xca>\xc0J\x98\xfe ^\x9f\xc6\xb3J\xadz=\x1dWL0` 4\xb5A\x96\x87\xdf\x9f$\xba\xc8\xd9\xc7\xb0\x9a\'\xdbW\x7f\xd6\x97\xac\x98[\x98h', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) write$cgroup_pid(r4, &(0x7f0000000340), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:05:13 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000003000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00044ad4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:13 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00004cd4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:13 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000a003000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2015.295755][T22171] device nr0 entered promiscuous mode 01:05:13 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:13 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000005000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2015.727786][T22194] device nr0 entered promiscuous mode 01:05:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b006558d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:13 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:13 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='rdma.max\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) write$cgroup_int(r2, 0x0, 0x0) r3 = gettid() r4 = perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x377, 0x100000001, 0x1000, 0x200000000000000, 0x0, 0x100000001, 0x40, 0xa, 0x100000001, 0x6, 0x7, 0x6, 0x81, 0x6, 0x7, 0x6, 0x3f, 0x100, 0x80000001, 0x1ff, 0x4a1, 0x1f, 0x0, 0x6, 0x6, 0x8f, 0xf12, 0x401, 0x5f5, 0x9e, 0xffffffffffffff39, 0x6, 0x1f, 0x2, 0xc4a, 0x1ff, 0x0, 0x7, 0x5, @perf_config_ext={0x3, 0xce0}, 0x8000, 0x5, 0x0, 0x0, 0x6, 0x7fff, 0x9}, 0x0, 0x3, r0, 0xa) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0xad0b, 0x8, 0x6, 0x0, 0x7, 0x40e00, 0x4, 0xc0, 0x5, 0x101, 0x8, 0x80000001, 0x5, 0xaecd, 0x7f00000, 0x7fff, 0x9, 0x2, 0x100, 0x9, 0xfffffffffffffff7, 0x5, 0xb562, 0x1, 0x1, 0xe0a, 0x5, 0x4dc, 0x400, 0x40000000, 0x5e363f1c, 0x80000000, 0x8000000000000000, 0x81, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x4000, 0x2, 0x5, 0x0, 0x5, 0x8, 0x1f}, r3, 0x1, r4, 0x2) 01:05:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000060d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:14 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2016.339490][T22225] device nr0 entered promiscuous mode 01:05:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b005865d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:14 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000006000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:14 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000008000a0", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x40600, 0x0) socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f0000002a80)=""/107, 0x6b}, {&(0x7f0000002b00)=""/253, 0xfd}, {0x0}, {&(0x7f0000002cc0)=""/60, 0x3c}], 0x4, &(0x7f0000002d40)=""/130, 0x82}, 0x10040) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000140)=0x7, 0x12) recvmsg$kcm(r2, &(0x7f0000000900)={&(0x7f00000003c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000440)=""/41, 0x29}, {&(0x7f0000000480)=""/212, 0xd4}, {&(0x7f0000000580)=""/251, 0xfb}, {&(0x7f0000000680)=""/237, 0xed}, {&(0x7f0000000780)=""/46, 0x2e}, {&(0x7f00000007c0)=""/65, 0x41}], 0x6, &(0x7f00000008c0)=""/59, 0x3b}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x7, 0x7, &(0x7f0000000080)=@raw=[@map={0x18, 0xf, 0x1, 0x0, r2}, @initr0={0x18, 0x0, 0x0, 0x0, 0xe7, 0x0, 0x0, 0x0, 0x3d7}, @map={0x18, 0x2, 0x1, 0x0, r2}, @call={0x85, 0x0, 0x0, 0x24}], &(0x7f0000000300)='GPL\x00', 0x4, 0x7c, &(0x7f0000000340)=""/124, 0x40f00, 0x0, [], r3, 0x1f, r1, 0x8, &(0x7f0000000940)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x1, 0x0, 0xfffffffffffffffa, 0x2}, 0x10}, 0x70) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r4, 0x0, 0x10120) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a80)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000a40)) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) [ 2016.450971][T22236] validate_nla: 6 callbacks suppressed [ 2016.450981][T22236] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:14 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000007000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:14 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000008001a0", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000068d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:15 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000009000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2016.854583][T22264] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:15 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000008002a0", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00006cd4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2017.012448][T22252] device nr0 entered promiscuous mode [ 2017.096980][T22278] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 2017.302703][T22268] device nr0 entered promiscuous mode 01:05:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:15 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000a000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000074d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:15 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000020000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x40600, 0x0) socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f0000002a80)=""/107, 0x6b}, {&(0x7f0000002b00)=""/253, 0xfd}, {0x0}, {&(0x7f0000002cc0)=""/60, 0x3c}], 0x4, &(0x7f0000002d40)=""/130, 0x82}, 0x10040) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000140)=0x7, 0x12) recvmsg$kcm(r2, &(0x7f0000000900)={&(0x7f00000003c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000440)=""/41, 0x29}, {&(0x7f0000000480)=""/212, 0xd4}, {&(0x7f0000000580)=""/251, 0xfb}, {&(0x7f0000000680)=""/237, 0xed}, {&(0x7f0000000780)=""/46, 0x2e}, {&(0x7f00000007c0)=""/65, 0x41}], 0x6, &(0x7f00000008c0)=""/59, 0x3b}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x7, 0x7, &(0x7f0000000080)=@raw=[@map={0x18, 0xf, 0x1, 0x0, r2}, @initr0={0x18, 0x0, 0x0, 0x0, 0xe7, 0x0, 0x0, 0x0, 0x3d7}, @map={0x18, 0x2, 0x1, 0x0, r2}, @call={0x85, 0x0, 0x0, 0x24}], &(0x7f0000000300)='GPL\x00', 0x4, 0x7c, &(0x7f0000000340)=""/124, 0x40f00, 0x0, [], r3, 0x1f, r1, 0x8, &(0x7f0000000940)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x1, 0x0, 0xfffffffffffffffa, 0x2}, 0x10}, 0x70) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r4, 0x0, 0x10120) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a80)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000a40)) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) [ 2017.510274][T22289] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:15 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000030000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:15 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000011000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00007ad4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:16 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000040000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2017.858838][T22314] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:16 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000003f000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00fe80d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2018.116510][T22318] device nr0 entered promiscuous mode [ 2018.133429][T22316] device nr0 entered promiscuous mode [ 2018.180294][T22334] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:16 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000050000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:16 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000008001a0", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:16 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000040000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000081d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2018.533753][T22346] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:16 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) recvmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000340)=@can={0x1d, 0x0}, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000500)=""/70, 0x46}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000580)=""/119, 0x77}, {&(0x7f0000000600)=""/226, 0xe2}, {&(0x7f00000028c0)=""/108, 0x6c}, {&(0x7f0000002940)=""/84, 0x54}], 0x6}, 0x12000) sendmsg$kcm(r1, &(0x7f0000002d00)={&(0x7f0000002a40)=@hci={0x1f, r2, 0x2}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000002ac0)="92878cf9f91add94c9e7fbdc0fd508f9deec52f72afb52dff23e93c597382618a7d6fab04a646769a8888a6918d8348b14535b477f16203e6b5b0a388077475803586fc0c02a1cc933dae8f21a4e43c36bb4da5891ac65623f6f953cc46a16f806ce9f9f8cb9decc165289209d5e974851c15a890665ca79c498a5fd68f5fb0bad95deed309ef7937c58139ead0f", 0x8e}], 0x1, &(0x7f0000002bc0)=[{0x10, 0x11e, 0x7}, {0xf8, 0x115, 0x0, "12787499246202e27b23fbdce335ed2dcef9e8280741f3501f51c0b71e2e62f17022a371f95ee200d31f3bd317fdd841b0217a867626c7c9c95df1ba556ddf7dc2323b11fe1089a5766e0a3ddc79388a8b3cf1d612884360edb8152636e1c8bbcef94b69f199e97f428408890e02dca1953edd8cba68ce5ae8d746c77c0427eee96fa8d1530c091102e2fb70d1219cc9dae9552d7cbc135f8fd6ca28aa5ea72354583e5167fa29bfb1b79ad490952ab4b596011e9ceb1a67d049bab4b6eebfee3c06c8fcf0662d64ea9037caf1827a1867fbf5b5ca491430d2b3201c54907a395dbb4844872aa4"}], 0x108}, 0x4048000) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000100)={r0}) 01:05:16 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000060000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:16 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000005c000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00fec0d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2018.851093][T22360] device nr0 entered promiscuous mode [ 2018.872630][T22368] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:17 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000070000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b0000f0d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2019.058660][T22376] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 2019.169639][T22373] device nr0 entered promiscuous mode 01:05:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:17 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000fe80000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b0000fcd4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:17 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000080000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:17 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000090000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2019.386214][T22388] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:17 executing program 1: socket$kcm(0x29, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) mkdirat$cgroup(r1, &(0x7f0000000100)='syz0\x00', 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8633, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000000000), 0xfffffea6) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000180)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x100000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 01:05:17 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000080fe000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b0080fed4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:17 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000000a0000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00c0fed4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:18 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000040030000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2019.810850][T22410] device nr0 entered promiscuous mode [ 2020.086133][T22416] device nr0 entered promiscuous mode [ 2020.095472][ T27] audit: type=1804 audit(1560474318.292:311): pid=22430 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir059715445/syzkaller.KnwWoF/1773/memory.events" dev="sda1" ino=16522 res=1 01:05:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b0000ffd4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:18 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000100000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:18 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000100000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:18 executing program 3: socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000002d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2020.763823][T22459] device nr0 entered promiscuous mode 01:05:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe04\xd8\x04\xe5\xf0s\x02\xdf[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5|\xd1\xab\xb49\xa34\b\x00'/103, 0x2761, 0x0) r1 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r1, 0x1, 0x25, &(0x7f00000001c0)=r0, 0x4) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f00000000c0)=@isdn, 0x80, &(0x7f0000000140)=[{&(0x7f0000000000)=""/42, 0x2a}], 0x1, &(0x7f0000000180)=""/40, 0x28}, 0x40000000) sendmsg$kcm(r1, &(0x7f00000059c0)={&(0x7f00000035c0)=@in={0x2, 0x4e22, @local}, 0x80, 0x0}, 0x0) recvmsg$kcm(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x2000) 01:05:19 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000003400000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:19 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000110000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000003d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000004d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:19 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000005c0000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2021.235007][T22460] device nr0 entered promiscuous mode 01:05:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:19 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000a000800000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000005d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:19 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000aa0000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:19 executing program 3: socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000006d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2021.560901][T22501] validate_nla: 7 callbacks suppressed [ 2021.560912][T22501] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 2021.685734][T22503] device nr0 entered promiscuous mode 01:05:20 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8918, &(0x7f0000000000)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)=0x896, 0x4) 01:05:20 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000300", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:20 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000a001800000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000007d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2021.834206][T22498] device nr0 entered promiscuous mode 01:05:20 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000100000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00000ad4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2021.877008][T22514] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 2022.068094][T22525] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:20 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000500", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:20 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00000cd4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:20 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000200000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:20 executing program 1: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) close(r3) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x12) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000003c0)={r1, &(0x7f0000000240)="2e83a7734a8829b874360b097ad3c6040d5520f8b48c462e7e4e432c5de79853f373b2d09949cdcfccab36147bdbcb189fe92eacb4a09d5a9ad55cfcb11fa54251d3ffb752394393cdab72bf7d9c92de2d72f41345bd9bb2deb1409fe17a9a8e93298d460bc08be71456ea", &(0x7f00000002c0)=""/240}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) close(r3) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) [ 2022.394516][T22538] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:20 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000600", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:20 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000300000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2022.456289][T22537] device nr0 entered promiscuous mode 01:05:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00000ed4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2022.592524][T22554] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00000fd4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:20 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000400000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:20 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000700", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2022.802962][T22569] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:21 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000010d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:21 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000900", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2023.159073][T22558] device nr0 entered promiscuous mode [ 2023.222165][T22590] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 2023.248902][T22583] device nr0 entered promiscuous mode 01:05:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:21 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000500000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:21 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000a00", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000048d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2023.539959][T22599] device nr0 entered promiscuous mode [ 2023.595174][T22606] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:21 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000600000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:22 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000001100", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00004cd4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x1}, @exit], &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x70, 0x100, 0x5, 0x81, 0x8020, 0x0, 0x3, 0x10, 0xd, 0x4, 0xffffffff, 0xfffffffffffffff7, 0xfffffffffffffffc, 0x7fff, 0xfffffffffffffff7, 0x8, 0x2d, 0x9, 0x4b43, 0x5, 0x4, 0xff, 0x0, 0x9, 0x7ff, 0x2, 0x2, 0xac1, 0x5, 0x9, 0x8, 0x3ff, 0x401, 0xfff, 0x8, 0x8, 0xfffffffffffffeff, 0x0, 0x101, 0x3, @perf_bp={&(0x7f0000000000), 0x1}, 0x1040, 0x9, 0x100000000, 0x2, 0x4, 0x10001, 0x5}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') 01:05:22 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000700000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2024.053409][T22631] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 2024.089029][T22622] device nr0 entered promiscuous mode 01:05:22 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:22 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000003f00", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:22 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000800000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2024.133067][T22631] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 2024.522421][T22654] device nr0 entered promiscuous mode 01:05:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000060d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:22 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) recvmsg$kcm(r0, &(0x7f00000008c0)={&(0x7f00000002c0)=@nfc_llcp, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/219, 0xdb}, {&(0x7f0000000440)=""/13, 0xd}, {&(0x7f0000000480)=""/206, 0xce}, {&(0x7f0000000580)=""/96, 0x60}, {&(0x7f0000000600)=""/164, 0xa4}, {&(0x7f00000006c0)=""/98, 0x62}], 0x6, &(0x7f00000007c0)=""/233, 0xe9}, 0x100) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002a000500d25a80648c000000040000001000094002376ee6735e000000053582c137153e370900018000", 0x2e}], 0x1}, 0x0) 01:05:22 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000004000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:22 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000900000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:22 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2024.661941][T22663] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 01:05:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000068d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:22 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000005c00", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:22 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000a00000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:23 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, 0x0, 0x5aa) 01:05:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00006cd4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:23 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000fe8000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2025.078775][T22689] device nr0 entered promiscuous mode [ 2025.098881][T22685] device nr0 entered promiscuous mode 01:05:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:23 executing program 1: r0 = gettid() r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000001e000507ed0080648c6394f20531d200100010402c00000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)=0x5, 0x12) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000240)) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000340)=r0, 0x12) perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0xfd, 0x2192, 0x101, 0x4, 0x0, 0x4000000000, 0x20, 0x1, 0x1f, 0x7fffffff, 0x6, 0x1ff, 0x4000000000000, 0x2, 0x7, 0x6, 0x8000, 0x9, 0x80000000, 0x8, 0x1000, 0x400, 0x7ff, 0x7e4, 0x1, 0x1, 0x0, 0xedd, 0x7000, 0x9, 0xdd1a, 0x3ff, 0x2, 0x9, 0x2, 0x1, 0x0, 0x1, 0x3, @perf_config_ext={0x5, 0x20}, 0x40, 0x0, 0x0, 0x8, 0x7, 0x100, 0x5}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0xa) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='[+vboxnet1\x00', r3}, 0x10) 01:05:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000074d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:23 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000001000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:23 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000000080fe00", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:23 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:23 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000001100000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b00007ad4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:23 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000004003", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2025.686005][T22720] device nr0 entered promiscuous mode [ 2025.714416][T22723] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 01:05:24 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000003f00000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b0000fcd4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:24 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000010", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2026.256396][T22726] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2026.267406][T22736] device nr0 entered promiscuous mode 01:05:24 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000004000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:24 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000340", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4036efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r0, r1, 0x2, 0x2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xc, 0x80000004, 0x80000001, 0x5, 0x0, 0xffffffffffffff9c, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0xffffffffffffffff}, 0x3c) r2 = bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r3 = socket$kcm(0x2, 0x5, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000100)={'veth1_to_team\x00', 0x10}) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f0000000080)) setsockopt$sock_attach_bpf(r3, 0x84, 0xc, &(0x7f00000000c0)=r2, 0x4) 01:05:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:24 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000006c0)='pids.current\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000640)={0x0, 0x70, 0x5, 0x76b, 0x6, 0x101, 0x0, 0x5, 0x10100, 0x9, 0x70, 0x7, 0x20, 0x1000, 0x3, 0x8, 0x2, 0xd5b7, 0x2, 0x6, 0x8, 0x9, 0x7ff, 0x8, 0x1, 0x1f8b, 0x5, 0x7, 0x8096, 0xfffffffffffffff8, 0x9, 0x4, 0x5, 0x354549f6, 0x0, 0x81, 0x0, 0xa1b, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x4000, 0x80000001, 0x3, 0x7, 0x7ff, 0x0, 0xfffffffffffff001}, r0, 0x2, r1, 0x8) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffd}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = getpid() perf_event_open(0x0, r7, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x1ff, 0x7fffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x2f8, 0x5, 0x9, 0x2000000000000, 0x1f9c, 0xfffffffffffffffc, 0xfb1, 0x3ff, 0x47, 0x1f, 0xffffffffffffff24, 0x81, 0x80000001, 0x7, 0xfffffffffffffff7, 0x5, 0x8, 0xfffffffffffffffc, 0x7fff, 0x81, 0x65, 0x7, 0x6, 0x200, 0xfffffffffffffff7, 0x9, 0x8, 0x0, 0xfffffffffffffffc, 0x0, @perf_config_ext={0xff}, 0x82, 0x77, 0x9, 0x5, 0x8, 0x0, 0x3}, r0, 0x3, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x3b, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd3", 0x0}, 0x28) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000340)={r6, &(0x7f0000000300)="7f8bbf3f3f951969fb39f51f4c8de632bb991a4418384b49d389", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x7) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x64, 0x0, 0x0, 0x1f, 0x8, 0x0, 0x0, 0x1, 0x4, 0x10001, 0x2, 0xff, 0x0, 0x0, 0x9, 0x1f, 0x3f, 0x3, 0x3, 0xabc, 0x8, 0xef51, 0x0, 0x6, 0x8001, 0x8, 0x1, 0x3, 0x7, 0x0, 0x4, 0x2, 0x625, 0x493fa62c, 0x0, 0x8000, 0x1, @perf_bp={0x0, 0x7}, 0x4000, 0x2, 0x40, 0x7, 0x40, 0xfffffffffffffffe, 0x20}, r7, 0xffffffffffffffff, r6, 0x1) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r6, 0x0, 0x0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r2, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x7, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x2, 0x1}, 0x0, 0x0, &(0x7f0000000400)={0x5, 0x2, 0x8000, 0x7}, &(0x7f0000000440)=0x83, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x6}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r7, r8, 0x0, 0xe, &(0x7f0000000240)='./cgroup/syz1\x00', r9}, 0x30) close(r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 01:05:24 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000005c00000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4096efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:24 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000a00080", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2026.654058][T22771] device nr0 entered promiscuous mode [ 2026.714075][T22777] validate_nla: 10 callbacks suppressed [ 2026.714085][T22777] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:25 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000ffffff8d00000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d45a6efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:25 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000a00180", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:25 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0x0, 0x32, &(0x7f0000000080)='wlan0:$keyringpro%L]\'}posix_acl_accesskeyringuser\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x7ff, 0x7, 0x3f, 0xe5b4, 0x0, 0x9, 0x802, 0x2, 0x1, 0x6, 0xff, 0x8e7e, 0x4, 0xd05e000000000000, 0x6779, 0x963, 0x7, 0xe6e, 0x1, 0x8001, 0x10000, 0x4, 0x7fffffff, 0x6c, 0xa8, 0x8, 0x8, 0x5, 0x5a29, 0x6, 0x1, 0x6, 0xa65, 0x1, 0x5, 0x1000, 0x0, 0x393, 0x4, @perf_config_ext={0x1000, 0x3}, 0x4000, 0xcb7, 0xbfc2, 0x8, 0x1, 0x5, 0xace}, r1, 0x6, 0xffffffffffffff9c, 0x2) socket$kcm(0x29, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='pids.current\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%L]\'}posix_acl_accesskeyringuser\x00') 01:05:25 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000008000a000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2027.025985][T22801] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4636efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2027.266503][T22816] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 2027.314489][T22787] device nr0 entered promiscuous mode [ 2027.335608][T22804] device wlan0 entered promiscuous mode 01:05:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:25 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000a00280", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:25 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000008001a000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:25 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0x0, 0x32, &(0x7f0000000080)='wlan0:$keyringpro%L]\'}posix_acl_accesskeyringuser\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x7ff, 0x7, 0x3f, 0xe5b4, 0x0, 0x9, 0x802, 0x2, 0x1, 0x6, 0xff, 0x8e7e, 0x4, 0xd05e000000000000, 0x6779, 0x963, 0x7, 0xe6e, 0x1, 0x8001, 0x10000, 0x4, 0x7fffffff, 0x6c, 0xa8, 0x8, 0x8, 0x5, 0x5a29, 0x6, 0x1, 0x6, 0xa65, 0x1, 0x5, 0x1000, 0x0, 0x393, 0x4, @perf_config_ext={0x1000, 0x3}, 0x4000, 0xcb7, 0xbfc2, 0x8, 0x1, 0x5, 0xace}, r1, 0x6, 0xffffffffffffff9c, 0x2) socket$kcm(0x29, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='pids.current\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%L]\'}posix_acl_accesskeyringuser\x00') 01:05:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4120afb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:25 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2027.602289][T22827] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:25 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000003a000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:25 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d41225fb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2027.714053][T22830] device nr0 entered promiscuous mode 01:05:26 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:26 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000fffffff500000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2027.881533][T22852] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb030003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2028.080332][T22863] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2028.242412][T22848] device nr0 entered promiscuous mode 01:05:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:26 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) close(r0) r1 = socket$kcm(0xa, 0x1000000000400002, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x7}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000740)}, 0x20004040) setsockopt$sock_attach_bpf(r0, 0x29, 0x32, &(0x7f0000000280), 0xcc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f0000000000)='cpusetbdev\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='\x00') 01:05:26 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:26 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000080fe00000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb090003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:26 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:26 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000007fffffff00000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:26 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) close(r1) socket$kcm(0x10, 0x40000000003, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000240)={'bridge_slave_1\x00', @random="01003a1e2410"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000380)='./cgroup.net/syz1\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0xffffffff, 0x4) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, 0x80000001, 0x0, 0x298, 0xe8a, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x9, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xe, r0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x14) 01:05:26 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2028.522470][T22879] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 2028.546895][T22875] device nr0 entered promiscuous mode [ 2028.558366][T22879] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 01:05:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb5a0003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:27 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000008dffffff00000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:27 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2028.830982][T22906] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2029.188607][T22896] device nr0 entered promiscuous mode 01:05:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:27 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000f5ffffff00000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb630003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:27 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:27 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x5c, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1ef, 0x0, 0x0, 0x0, 0x93, 0xfffffffffffffffc, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xf}, 0x0, 0x800000000}, 0x0, 0x4, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x600000000000000, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)={[{0x2d, 'memory'}]}, 0x8) [ 2029.444416][T22926] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. 01:05:27 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:27 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000ffffffffa0030000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2029.499036][T22933] device nr0 entered promiscuous mode 01:05:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efbb60303000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:27 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:27 executing program 1: sendmsg$sock(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0, 0x0, &(0x7f0000000600)=[@timestamping={{0x14, 0x1, 0x25, 0x805}}], 0x18}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r1}) 01:05:27 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000001000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2029.807954][T22953] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2030.089814][T22942] device nr0 entered promiscuous mode 01:05:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:28 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000fffeff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb122401000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:28 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000034000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:28 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:28 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\x00\x00ts\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xd, &(0x7f00000000c0), 0x80c) [ 2030.273897][T22968] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. 01:05:28 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000ffffffffa0008000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:28 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2030.374211][T22971] device nr0 entered promiscuous mode [ 2030.408825][T22976] device nr0 entered promiscuous mode 01:05:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120203000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:28 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='^\x00') close(r2) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00'}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r3, &(0x7f0000001000)="413e8880f1f315857dbaa1bbfbf656b4fc0ecdac1ca73b13a95f69e38568fb69f2bbcfe9c72d6873889ad6b53d1e7404cd13ac21fd09468954312d267f1b86d0439dff940ffb390fe006b61e810ad77e", 0x0}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000280)={r4}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f00000002c0)={'nr0\x00', @remote}) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) sendmsg$kcm(r4, &(0x7f0000001440)={0x0, 0xd7, 0x0}, 0x84) sendmsg$kcm(r2, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x4, 0x7fffffff, 0x1, 0x3b5, 0x0, 0x1f, 0x200, 0x8, 0x7, 0x8000, 0x1000, 0x8, 0x3ff, 0x0, 0xffffffffffffff18, 0x1, 0x7, 0x1780000, 0x101, 0x1, 0x24, 0x600, 0x2, 0x7ee, 0xfffffffffffffffc, 0x5, 0x46a, 0x7, 0x6, 0x5, 0x4, 0x5, 0x3, 0x1a21, 0x1f, 0x7ff, 0x0, 0x9017, 0x2, @perf_config_ext={0x1ff, 0x9}, 0x8, 0x8, 0x7, 0x0, 0x101, 0xaa, 0x80000000}, r4, 0xffffffffffffffff, r1, 0xf) openat$tun(0xffffffffffffff9c, 0x0, 0x100, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000fc0)={&(0x7f0000000f80)='./file0\x00', r4}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r4, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') mkdirat$cgroup(r4, &(0x7f0000000040)='syz0\x00', 0x1ff) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000100)="9a34a684f2332cdf991618f0898d02f41ee391a4d25c0df17d788674cfcdc4be8992c4cc640cc4c9ad3bfef2c9f4960f24ea02809774c4467b652bd868e50161af79b7", 0x0, 0x2}, 0x20) close(r5) 01:05:28 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:28 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000ffffffffa0018000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2030.608541][T22995] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. 01:05:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120303000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:29 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:29 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=ANY=[@ANYBLOB="85000000070022cd82cf71da324a909ad000004c00000000"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x3}, 0x14) socketpair(0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0xfffffffffffffddd) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000080)={'team_slave_1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) ioctl$SIOCSIFHWADDR(r0, 0x89f0, &(0x7f0000000000)={'tunl0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r2, 0x0, 0x6, &(0x7f0000000200)='^ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x5, 0x572, 0x8, 0xfff, 0x0, 0x5, 0x2010, 0x9, 0x9568, 0x2, 0x1, 0x17d5f177, 0x0, 0x4, 0x2, 0x7, 0x0, 0x4, 0xff, 0xf323, 0x100000000, 0x8, 0x0, 0x3, 0xfd6, 0x7fffffff, 0x100000000, 0x80000000, 0x2, 0x1, 0x1, 0x3, 0x0, 0x6, 0x40, 0xffffffffffff7fff, 0x0, 0xfffffffffffffbff, 0x2, @perf_config_ext={0xfffffffffffff801}, 0x2, 0x4, 0x7, 0x2, 0xee4, 0x1000, 0x200}, r5, 0xffffffffffffffff, 0xffffffffffffff9c, 0x2) 01:05:29 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000001", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:29 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2031.232409][T23020] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. 01:05:29 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120403000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:29 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000002", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:29 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2031.486733][T23045] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. 01:05:29 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000003", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120503000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2031.649716][T23043] device nr0 entered promiscuous mode [ 2031.789313][T23061] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. 01:05:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:30 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:30 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0xffffffffffffff90, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000001780)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0}, 0x7ffffff7) 01:05:30 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000004", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120603000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2032.090133][T23073] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. 01:05:30 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:30 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffff4}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000080)="9d60dad56378c25345e667bf93bfed8ef2ca27da1802466fcd05c0b977a0f769b9bffe91a3f67ee43a50b04c415fd98067c9d16e4a0af84b0de424d05e82e239e0be93566f4f71c7ad7e078d469a57c870e1c93c9a0c853464fade1cea8a91deab080b1ec1e70b24e2d9", &(0x7f0000000140)=""/89}, 0x18) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x1d, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='wlan1\x00') 01:05:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120703000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:30 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000005", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:30 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2032.373462][T23093] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2032.401286][T23089] device nr0 entered promiscuous mode 01:05:30 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000ffffff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120a03000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:31 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000006", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:31 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000008000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:31 executing program 1: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080), 0x4) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000002c40)={&(0x7f00000019c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000002a40)=""/142, 0x8e}, {&(0x7f0000002b00)}], 0x3, &(0x7f0000002b80)=""/132, 0x84}, 0x142) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x16, 0x1ffffd13, &(0x7f0000000040)=@framed={{}, [@alu={0x8000000201a7f19, 0x3, 0x6, 0x0, 0x1, 0x50}]}, &(0x7f0000f6bffb)='GPL\x00', 0x10000001, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], r1, 0x0, r0, 0x8, &(0x7f0000000000)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0xfffffe8c) 01:05:31 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2032.880863][T23126] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. 01:05:31 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000007", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:31 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000008001", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2032.931059][T23128] device nr0 entered promiscuous mode 01:05:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120c03000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2033.084515][T23141] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. 01:05:31 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000008002", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120e03000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2033.586144][T23147] device nr0 entered promiscuous mode [ 2033.635072][T23161] device nr0 entered promiscuous mode 01:05:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:32 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000008", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120f03000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:32 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000ffffff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:32 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x5, 0x0) close(r1) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\x00') setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000380)=@in={0x2, 0x0, @broadcast}, 0x80, 0x0}, 0x0) 01:05:32 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000080", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2033.994235][T23173] device nr0 entered promiscuous mode 01:05:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb121003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:32 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000009", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb124803000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:32 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000000008fffe", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:32 executing program 1: r0 = gettid() getpid() r1 = perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)}, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000280)=""/221) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='^\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='io.stat\x00', 0x0, 0x0) close(r3) r4 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0xfffffffffffff4ca, 0xbf9, 0x0, 0x0, 0x0, 0x7fff, 0x8e010, 0x0, 0x0, 0x9, 0x4, 0x3, 0x8, 0x6, 0x0, 0xbd59, 0xd3b, 0xffff, 0xfffffffffffffffe, 0x869, 0x0, 0x6, 0x9, 0x5, 0x63, 0xfffffffffffffffb, 0x4, 0x8001, 0xbbfd, 0x8000, 0x6, 0x9, 0x1, 0x8, 0x10000, 0xe314, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x3}, 0x100, 0x4, 0x100, 0x5, 0xbf66, 0x1, 0x6}, r0, 0x0, r1, 0xa) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x1) sendmsg$kcm(r3, 0x0, 0x40000) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="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", 0xfd}], 0x1}, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000fc0)={&(0x7f0000000f80)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$cgroup_int(r4, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0x0) socket$kcm(0x29, 0x0, 0x0) [ 2034.664479][T23192] device nr0 entered promiscuous mode 01:05:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:33 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000000000000a", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb124c03000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000f7000061104c000000000062000000002b6d81819ee08366000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 01:05:33 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000007fffff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:33 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:33 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000010", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:33 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000008dffff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2034.885097][T23226] __nla_validate_parse: 4 callbacks suppressed [ 2034.885110][T23226] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2034.958278][T23225] device nr0 entered promiscuous mode 01:05:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x62, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000580)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x7, 0x70, 0xa257, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0xffffffff, 0x44110, 0x1, 0xffffffff, 0x101, 0x8, 0x3, 0x7, 0xe0000000000000, 0x10001, 0x0, 0x4, 0x5, 0x8, 0xe2f, 0x8, 0x10000, 0x1, 0x3, 0x10000, 0x7ff, 0x1, 0x7ff, 0x6, 0x10000, 0x3, 0xffffffff, 0x8, 0x31ac, 0x80000000, 0xffffffffffffff10, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000007c0), 0x3}, 0x9000, 0x8000, 0x100000000, 0x7, 0x20, 0x0, 0x6}, r0, 0x2, r0, 0x6) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000180)=@pptp={0x18, 0x2, {0x3, @multicast1}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000200)="f9d045ff78a04c0b1b648be3c6a4e24901c66178ad07ae4e3db423c0b50b79cd99d02af22dfc3370aed074c9ede7da9c9122c167b7e1aa4f1ae4cb4d0cb2a070fe1a48c0d483ccda02b2ff2f3851d4fae119a7951e811b67ca717c7dc31d4ff6eda3fe5b07c6af60691ed1182b777d16b3adee7e5d5948b65361afb7fa6724c78051373f2cc7774a10183532834b278bb5bde2be6a9fe898a6e7c789e54a92cc292983076fc871bae216940ba8bd0fa8d81a21e48af259b313f23c0a5239e188c65463dde5d8d991b026218400", 0xcd}, {&(0x7f0000000300)="5975470ad67a9a24e58419cc0d6bcc26e0525dbc508bdd114dc944c8f766217b59e3b6261885fb448deda463d6ccb7f38341534fea637961f5097515fd558751e575cf3654164aa44dd5ca541b209f0792bbefc3aa59da30a2b02fa2cbb3e18f0dfa2e8dfdac83d5dfe4d7f653f43b869c52a000db27093960adc9eb5f4b35218448cd99facc00c9d91c3fa255142496067150fe670ccdd2024fb63b933785299508725c94a6e666e8f9943448d6495061a2ac2833c3bdf8404e3622f5a67418cbd1a36e90213543ab72b6b6b20e568800", 0xd1}], 0x2, &(0x7f0000000440)=[{0x80, 0x0, 0x9, "3ed65bf522b787638b4b28cc66831efacca796bc3d7533bd733ff9a8544cabc560fa342e638aad70f698407aa14a942b25e4ac45ccd5eda7623b5d1b0fe88025f9d662537973b4665defec1913d7aa0f2f5d7260a361224a679e0f64acb44c65b48900389f402104993a4ffe206c"}, {0x48, 0x6, 0x6daa4a64, "5072ac60bd4c50d56b486f52cbc8c28e11bd2adcc70a38685efc3bd338cdaae203b5d95a522a00196d9f5f4374c4f64c8c096a9fdf05192f"}, {0x10, 0x13d, 0x10001}, {0x20, 0x114, 0x2, "87260f6c470d041ff9bf"}], 0xf8}, 0x40044) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x8, 0x7, &(0x7f00000005c0)=@raw=[@generic={0x9, 0x6, 0x40, 0x0, 0x6ea5436b}, @exit, @call={0x85, 0x0, 0x0, 0x59}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7f}, @ldst={0x2, 0x3, 0x6, 0x0, 0x2, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0xb}], &(0x7f0000000600)='GPL\x00', 0x0, 0x7d, &(0x7f0000000640)=""/125, 0x40f00, 0x1, [], 0x0, 0x9, r0, 0x8, &(0x7f00000006c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000700)={0x3, 0xd, 0x200, 0x6}, 0x10}, 0x70) 01:05:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb126003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:33 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000011", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:33 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000f5ffff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2035.265732][T23253] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2035.594562][T23246] device nr0 entered promiscuous mode 01:05:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[], &(0x7f0000000200)=""/87, 0x0, 0x57, 0x1}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu\x00', 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9, 0xffffffff, 0x2032, 0x4, 0x100, 0xffffffffffffffff, 0x8, [], 0x0, r0, 0x1, 0x2}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x5, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000020000000000000005000000850000006700000004ba00005f2e567e950000000000000018100000", @ANYRES32=r1, @ANYBLOB="000000000000000018150000", @ANYRES32=r2, @ANYBLOB="00000000000000181f000000", @ANYRES32=r0, @ANYBLOB="000000000000000095000000000000009500000000000000"], &(0x7f0000000380)='GPL\x00', 0x5, 0x7a, &(0x7f00000003c0)=""/122, 0x41000, 0x2, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000440)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x1, 0x0, 0x3ff, 0x8}, 0x10}, 0x70) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r4 = socket$kcm(0x10, 0x2, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003a0081aee4050cecdb4cb9040a485e510befccdf7f3e9cf0758ef900e1cf3aebb1cb4c100c0003720000", 0x2e}], 0x1}, 0x0) recvmsg(r4, &(0x7f0000006600)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r3, &(0x7f0000001800)={&(0x7f0000000640)=@vsock={0x28, 0x0, 0xffffffff, @hyper}, 0x80, &(0x7f0000001700)=[{&(0x7f00000006c0)="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", 0x1000}, {&(0x7f00000016c0)="f8e7388909ea10", 0x7}], 0x2, &(0x7f0000001740)=ANY=[@ANYBLOB="980000000000000011010000200000001a5e3f88e95803081a7d3f76361232a8e41b7ce1e32a5d54d83bd29bfdc44b849061db3d43eb1fbfae8d4bf233c566b07100bcfeb7a87e83d323fc352f73df7a065213b547eade888b01d7ba64267a0c761a9107d2ed989395d75299a7bf18a00f3b57ae56e7897486e58df3e03cb7afe0c69bdb16ed9bc713b6e30000000000000028000000000000000f0100000400000095056943165bbc27d1481feb08e4acf7f10ac6f234cf049a"], 0xc0}, 0x4000044) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$TUNSETVNETHDRSZ(r5, 0x400454d8, &(0x7f0000000580)=0xffffffff) ioctl$TUNSETSNDBUF(r5, 0x400454d4, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000540)={'eql\x00', 0x600}) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r6 = getpid() perf_event_open(&(0x7f0000001840)={0x7, 0x70, 0xff, 0x10001, 0xd64, 0x12, 0x0, 0x7, 0x4000, 0x5, 0x6f8, 0x0, 0x9, 0x9, 0x800, 0x4, 0x6, 0x1, 0x1, 0x2, 0xffffffffffffffff, 0xf098, 0x3f, 0x7fffffff, 0x3, 0x80, 0x7, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x9, 0x40, 0x3, 0x7, 0x67, 0x4, 0xfffffffffffffff7, 0x0, 0x9, 0x4, @perf_config_ext={0x5, 0x3}, 0x2001, 0x1, 0x3, 0x4, 0x6, 0x8, 0x1000}, r6, 0x6, r1, 0x9) 01:05:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb126803000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:33 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:33 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000000000003f", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:33 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2035.803032][T23270] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. 01:05:34 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000040", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb126c03000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:34 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="1b0000001a008100a00f80ecdb4cb904024865160b000000d4126e", 0x1b}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r1 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x7, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4f, 0x5d}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8", 0x0, 0xf000}, 0x28) recvmsg$kcm(r0, &(0x7f0000000840)={&(0x7f0000000040), 0x80, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/236, 0xec}, {&(0x7f0000000280)=""/194, 0xc2}, {&(0x7f0000000380)=""/175, 0xaf}, {&(0x7f0000000440)=""/249, 0xf9}, {&(0x7f0000000540)=""/205, 0xcd}, {&(0x7f0000000640)=""/244, 0xf4}, {&(0x7f0000000740)=""/116, 0x74}], 0x7, &(0x7f0000000100)=""/3, 0x3}, 0x40000000) 01:05:34 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2036.069297][T23293] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. 01:05:34 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000000000005c", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb127403000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2036.211223][T23294] device nr0 entered promiscuous mode [ 2036.382405][T23313] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. 01:05:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:34 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:34 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000ffffff8d", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:34 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000ffffff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb127a03000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1a7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000480)='nr0\x10\x03`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x30e) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}], 0x2, &(0x7f0000001840)=""/33, 0x21}, 0x0) r4 = socket$kcm(0x2, 0x2, 0x2) close(0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.\xb61\x00\x00syz0\x00', 0x1ff) r5 = openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000000)={r2}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x100, 0x0, 0x0, 0x1a7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x1000000000000002, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000380)='nr0\x10\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='memory.high\x00', 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f0000000280)=ANY=[@ANYBLOB="a21ab24b1f9245f5a85137d40a0c02240c87df95ed95425200"], 0x1) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r7, 0x400454cd, 0x308) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000002c0)={0x3, 0x70, 0x8, 0x100, 0x3, 0x1e13, 0x0, 0x0, 0x10c00, 0x1, 0x4, 0x200, 0x5, 0x5, 0x4, 0x0, 0x1, 0xe0, 0x7, 0xc, 0xa81f, 0x3, 0x5, 0x8825, 0x20, 0x3, 0x0, 0x1, 0x2, 0x1f, 0x8, 0x0, 0x7, 0xffffffffffffc5fb, 0xc06, 0x6f, 0x2, 0x7f6, 0x0, 0x4, 0x4, @perf_config_ext={0x80000000}, 0x2342, 0x8, 0xfffffffffffffffc, 0x1, 0xff, 0x2}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}], 0x2, &(0x7f0000001840)=""/33, 0x21}, 0x0) [ 2036.789748][T23324] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. 01:05:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb12fc03000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:35 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000ffffff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:35 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000aaaaaafeffaaaaa8", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2036.956491][T23339] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. 01:05:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120005000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:35 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000ffffff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:35 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000000000aa", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2037.313779][T23348] device nr0 entered promiscuous mode 01:05:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120006000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:35 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:35 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:35 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000a8aaaafffeaaaaaa", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2037.700319][T23383] netlink: 'syz-executor.4': attribute type 6 has an invalid length. [ 2037.901463][T23394] device nr0 entered promiscuous mode 01:05:36 executing program 1: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000002c0)='cpuacct.stat\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x60e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x200400, 0x0) sendmsg$sock(r1, &(0x7f0000000000)={&(0x7f0000000040)=@rc={0x1f, {0x100, 0x40, 0x8000, 0x23, 0x4, 0x3}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000680)}], 0x1}, 0x100004008010) socket$kcm(0x29, 0x7, 0x0) 01:05:36 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:36 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000fffffff5", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120007000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:36 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120009000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:36 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:36 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000000080fe", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2038.306206][T23416] device nr0 entered promiscuous mode 01:05:36 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000007fffffff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb12000a000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:36 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:36 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0408b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) sendmsg$kcm(r0, &(0x7f00000018c0)={&(0x7f0000000000)=@vsock={0x28, 0x0, 0xffffffff}, 0x80, &(0x7f00000015c0)=[{&(0x7f00000000c0)="91188824dd9173811855d8938672e03d193b5ba3f1afd4", 0x17}, {&(0x7f0000000140)}, {&(0x7f0000000200)="7a8551c60a3ced02a2f7be2b8209b191f2583b15744219621782203bcc68ef89208d79d032e3126a985f5ee0f1c85de4115c72b78e9995dcd19da6b915929044ce1a96cff4b1f95a819f1a4319955d527b91721c0ad0e5b40648", 0x5a}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="3a993e8cf91a3f55b50e4124bd821f8144c3e5531f67ccab40738ed19cf84368000481fd39a864", 0x27}, {&(0x7f0000001300)="2b512fcf59f78be55f70809715e19c9833e96a54c47bc4a8c6fd12ae845cb3d2541e4bbfb2a0773bcc38472df23c387e2cabccbf3ab17ff123b1f7d005ceab02eadff0adce0a1cfa2ea915b5294104dd38d95a31ae5493a6586f27f3555d93a8a57b602966362dd4572bfc13fafeeaa205e3d7bf51ca667e832f2ba9ecc12028209ca539a574a24d83980be7a1ca28e14550cb55ef03b9ece3f0b109390c53e498", 0xa1}, {&(0x7f00000013c0)="116e4960f218a03f7738078505d62e640d4d41eeaad20c28d3018ee0cd078bcd6212bebffe79ba135905d62922e69f33c89b68b4a962e35c1e25538bdff1fcceeeffd17916d26cc2a0218232fa3b75a61aa63783e27972c78c27ba451e83b142079a357101b11e9e56ddc2a1d3fc3847a9ee6223cadba2c78e1ae5cd0f182d64a37313936f2e11b3a235fe430843cbb8fe5c64ada65347cf1641538b3e1cdd601d8d", 0xa2}, {&(0x7f0000001480)="1b9ad693ea7651310072f701625a47c63ef053540bb655d0ae0ef37c2a3b0807cb61edaba84db3ff0d9277ff2c1f904a8f5a0e4bc5f30d80de40309cc8933143c562372f32a263a3f50124e3c1c2908a03d73270ce98dedc981abd1bace0e1c64ed1b4370acbb8f54b640678f6b000ef501cace19bd0e481be5a6efae77413b02303a85903117c5c658ae8f3c4c6162136815b", 0x93}, {&(0x7f0000001540)="f6bbb6114001dbf1", 0x8}, {&(0x7f0000001580)="1b6f2f81ce2f1570d9356c7856f2e46f294874627ee023f47b1d5fd153e526ff4e0ae5ca8e900a79666effdd", 0x2c}], 0xa, &(0x7f0000001680)=[{0x58, 0x11f, 0x4, "0ccb31d2bec4e924916a324098ec8cdd0d52206849510957443f67c5c5eb3a421f4a00c6ba137a56b5e15cda1521c81e913771ccc4fe67568ba1a360cfcbef8d48bab846"}, {0x70, 0x12f, 0xffffffffffffffff, "7ba1d14acc44177668ecc892bd4c4a83441fb94d9d7ae21cbab6e23a956706da348d4394a3cf2effbcf0399fb9017374abd0b837c9c912ae533851ee412712cbb271345574ca3ca5ca072cec6417abcb3dd5c7597eac396165f742dcccf0"}, {0x70, 0x113, 0x1, "961249ae2c1d2225e6204e47860c0043bbc7d47b0236547c836666d35713eaa3b5d9480a84aea1817ce784b65258896ba0bffeb73328210b73ab5c989547c981bd9ddae6005d0706eeb080c816e50cefbdf9b52e142fdde93caf705c"}, {0x100, 0x10f, 0x8, "728b893e7bdd6cdf9171c602c4738e463a359cd4640e1d1cbcfe8f92e88f6b1adb29f75f9edba879ba51b013955b0e65211bbeb3026c9ea64682d4423117cd1b1c48a184e49d03caa07c240f3f1062d48e9d0e823c97adbb07988f4dd27d1128517c2c658db58ca4328847822e2af30e0d2aca7c7ec62a45f34eb75a04b3dcecd05f7eb27ec6cc74f65b36159787faafdc9ed9beb407891a74cc93a8bca414fb220dddd0261a2681f21e269d4d865f8ef0bdc5fde6614427ac249d8e224db66d5f473c5bb2375d8ce154b6c99927318f3c5160684311c15371dfb47021bbdb81251cef07c1227d3b8e"}], 0x238}, 0x4) 01:05:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb12000b000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:36 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000ffffffff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:36 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2038.802632][T23451] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 01:05:37 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120011000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:37 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000008000a0ffffffff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:37 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120012000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:37 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:37 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000008001a0ffffffff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2039.504577][T23451] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2039.553563][T23485] device nr0 entered promiscuous mode 01:05:37 executing program 1: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_all\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0xacd0, 0x1, 0x2, 0x2b78, 0x0, 0x40000000000000, 0xa12a, 0x5, 0xbb2, 0x4, 0x3903, 0x2, 0x3, 0x5, 0x1000, 0x4, 0xfffffffffffffff9, 0xfffffffffffffffa, 0x8, 0x2, 0x5, 0x2, 0x2, 0x48eab940, 0x5, 0x2, 0x129614e6, 0x8000, 0x4, 0x0, 0x6, 0x6, 0xe98, 0x4, 0x5, 0x3, 0x0, 0x400, 0x4, @perf_config_ext={0x3, 0x3}, 0x10, 0x400, 0x4, 0x7, 0x8000, 0x3ff, 0x9}, 0x0, 0xa, r0, 0x8) openat$cgroup_type(r0, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='../..\x00\x00\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) 01:05:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120014000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:37 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:37 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000003a0ffffffff", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:37 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2039.765740][T23510] netlink: 'syz-executor.4': attribute type 20 has an invalid length. 01:05:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:38 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000002000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb12001d000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:38 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:38 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000004c0)={r2, 0xc, 0x1, 0x2, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) socketpair$unix(0x1, 0x3, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)="579934592362c768d71111161aa226cb6d89b0d2acddcd4d18822246baf01ff49965b30560e16e07a4c5b25e74997c161467eb2f5f10fdd5550b78dfefdc2b38ed58c90c4858d06546582c0eccdcefccefc34e7e36eaf5225fe30045288499c0ab762409f8d1defcb268e1d0ce14edb751ae04fc1df4bcf849c2b1a537126976a37b258c10210fb617b83b940d915f7c4179cf427b7f3e2ec8b3365539125d431b11ecabe2c94e4c6e01f9b6ec8caff07407e60648476cf0e5", 0xb9}], 0x1}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) r3 = socket$kcm(0x29, 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000000c0)={r3, r4}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socket$kcm(0x10, 0x2000000000001, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) r6 = socket$kcm(0x10, 0x3, 0x10) r7 = openat$cgroup_type(r2, &(0x7f0000000500)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r7, &(0x7f0000000540)='threaded\x00', 0x9) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000580)={r5}) socket$kcm(0x10, 0x0, 0x10) 01:05:38 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2040.172587][T23532] netlink: 'syz-executor.4': attribute type 29 has an invalid length. 01:05:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120040000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:38 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000003000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2040.275795][T23533] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 01:05:38 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb12005a000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:38 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000004000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2040.583383][T23551] device nr0 entered promiscuous mode 01:05:38 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:39 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120002000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:39 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000005000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:39 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004020000000000"], 0x0, 0x26}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x8, 0x2, 0x5, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x0, 0x1}, 0x3c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffff9c, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0xeaf, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x4}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0xb, 0x0, 0xffffffffffff7bb9}, &(0x7f0000000100)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x8}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=r1, 0x4) 01:05:39 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:39 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000006000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120004000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:39 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2041.298464][T23606] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 01:05:39 executing program 1: r0 = socket$kcm(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r0}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc7be, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e000000260005000000e0713c444d240a000000100003400a000000053582c137153e370900040002000000d1bd", 0x2e}]}, 0x80) 01:05:39 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000007000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120005000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2041.406797][T23602] device nr0 entered promiscuous mode 01:05:40 executing program 5: socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:40 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:40 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002000000000000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x40000000000002, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="fa0c000012008152915a655267d7d137ab2ff96e27bf28b285fe3903a44a6017edcaa3a2b4dade3baee72569b51366463fedf5e787c05b0cb5927a3a7edfb4d078e9ae1504d489e058be9fafaa633705b6d4bf6a01f2cd9ebf19724a1b0b9760612582bccd3983ce4474844c065e914dab8bbd52a45f431678bfe28633bf7c8dc83df809238ed87f1e393883ef750ce79c6f84e5e5de176e2f26024e4e3a3d8fbdaf3254022f265d8ccc5fd7205d9d9c2c407ec58162523082d81a39c43f782332ba8e82b4107a049cb82bba8b5edd80473844291437b8d22edca68047582e6be601e9df5e60a32c7cd202c5a30b8b606e43362739551cbb013b65e238f41cc00d7900140cf06b7bc9030f2563bcf9d4f4b7f48c79ec1a323d06276a0a3f8846b7c62b66f9709cabcaad234c53f3bc9b11165a6321f1db1057f076cfaebf8fbfa033fdc1dc2c3e314b36b3b3dd50425447da8bc5938ff7a17361100ab0b1ffeab7ac487411824224781eb9cdd4edef57ae91cd61f56a56c0599cfc3a491447207610f242da6cd6b030ae5f35e3181c44ae68665a023759b9ef4358db46107edc49194aed72b62600ec0ae4fc9065be059fc010cd6e6c9ea77c666b5e25693fbcf595e3e57113ff3a0e0c63d0604a16ea5adb8b7b54d47d4d8804612fde571863064528a49bf684d8a880a11afd819f186c177c49cac3ba1e9d1aa7ad0ff36b9e36d73c05b8abcaf96df0bacd2c9653f30ec29e1284af8749a9b2803c2727e992a6e65df192e1875c3e6d3553ffb7cb34ffee8f8ac0123c390454b42a0316952cbc9949376d9320ec207f77c2d5eb9e86d720cf8e9008a9a51932b45cd4cab21414c92d1c20f9e15e3fc16c7ce181e9ab19b01b70343934c823b1215e173405dd225233823cd4a604a77f06b14eb05b860e6cf8790335788c43abe9de1598e9952e5c7e6b2f8b17b1788ff3033e7d1635b008834bdf4054e6195e55000827c6202b227dde06f23ae21c00b371bdb6b7ea47b2e78844b52a77f9f0929790dcd7df2752e4af092d539c87c18751a5eb3eb4d38a2a0e070064b4ffaacff0543b115cc89f6c7e78f12147ebfcf1c80bac8f98deb59cbe670adb4cd1882a7e0ca4ba85ae9d445223ffb32301d46c0c9b05a830cbea0f72294ab3b539e4ed7cac2e22b235e8ceedeb643fb90b061a58368e76036ff3c1828d8a4e21288662afb6f2acab00d734db7ffc8373a928571819ce9ea6cb0956a6093b2b1f65662b76bc6ac8a171451714e1d0e4ff7647fe7551d3cf16f37cb5547317e4fef51e4fb471de6ffbb90c2dd4a64266c4c2f75fc62e58ec306fb92212fb262d8b138899a3b53e67cde2f97d94cd2265cc04d32b29edf77e75b1f88372495cb2937f183bfc8604d72efb3af5c1f41b665b25592676b0ad2185478eade7e663e743e0e09cce6224c787ce1d789dc4a9b350bfe3a75f551341b11dd96cdaea17989dad565b16324a69842dc29a0ed16744ea5935598ac8238e146139189927a14d3b2863044b63b468ae75f48fab68ad235c36daffebfe4b468fc9b13198b1a683dcd3b3b4294ba22caddbacf8792d5783bc12e2538e4609e6bb6e9eeab98a06452c252a657f400260458c29fae8879097698c9aba2b2d889fc78f00d0d8271e09e8542b71018be6ff8cb03cb423e79303047d6ce124a00f64461b899bbddc4fe87ff677533391e16c01fa9cd6420bdc856c4c7f057b249ee9817efd6ab2cd02eb887d2631435ef2d5a1c7e57ac046ef615a1285ca89ade18ae69af3b3f8f76ca8aa060e373c0f99424fe1c5fadc72fe145fd2d4e4da4b78597890516857de188fcdaf15e3b0871b346cd39ab772cc25fab49e60c818cde934b137144adfc4fbde3ddbeccce9679f02b66746e822c67b3ed5fdafb4a936a2683b39a002115ecd62220605ca542610a80f2e3530aa89d3ed6ed9c57bbfd5db3a0b62786a608309a355443c616032008f9458b2f10db93e29470192370084e9322c309c9b23333b46d04e79176659503ad4b05deebb3c67d715ee6e84a89002ea6f7f71bf41ad36b42c8ae01c97174dbb641e50641aba60c291a84e906c013087370a5043e07d36fcead378f6c1e6ed3f5ac695124b82b20261cf7c9b82172e09c81d7d39eed72aee5678613a3c671ddd44f2c7c75a3b5d316aa165d56594fccab20903d7f503a08928e76c779918b2463b720ee6367a43e494a1db3ed1a80690e665570c01ce7eb979cdd95d4e1ca51730eb2cd63ffb2a56049601627c9788254945142dce85adbe1eb5997d16cdfe2a3758b13dc6bb121e2206ae64206868c1c5e89a101bc121719ac435dcad093f5f67cefd863cc7c8f3fc8a9dc62a83c115f1ce714b18af067951aa06dd9bb4ed98a820bf4704d156977caa4e6415b2a0df0386e2f6a061bf44abc8a397cf4abdafc51b78ebec9831f3c60fde6e62a1fd082903080aef20ff8de8bc0dced06f627514600539ca7114a088848da4244a85b4cf5b976d3a698c9a568d417e276917baba05d1a02181db2e6cc35986da4ccc63f8cd8e85a4a923dd27e2f499664601fdc44fdf46e2d2880cd5a7ece89c370234c438dcc0b43865cc62bad21e9dc37da758cbe01752f02fd9cbfe98630a30a78bb1239e25cdaba3d45d13cd3e7216d9d8070f3ff1a0cd9a0c91f29974c98f2677ba88c1091bde4be0cd37ea5eeb3b9cd59560a00ddd40bbd60ffb8d4daa973ef0977c18dd4b38a605cee957872dca85787c37b6931293eddb77015faf143d1d28d24822d1a5d134799e8175a38b255aaf0e39b68c7f734e2e1e7044626daa84c9113e86d86ef63c863703703ea163319261dcf516c32d49478f7af30d52baa18ea6b0fc286c06b7e4ee019bf3fe74845a652d4a52aaa241a189c411e90e2953863a2bc4124e573607b94cdff19e280731824931a83f056cb5857672619b97ce38081592c0c319ce72e04e9eadce89775cfb5a4b2842663bc79bde565435cbcd46c4d505ceef7dde86512d39d4cb270deb7e79ebf8602bdc0d76c3e833d36ee08be10be634f44056c2f3fd6a328c7cd562e9c96ff7845fc3df81a876bb07f1cc833bed6ca1dc5cf935a4e959db6a4fae6edbc45357d8758faa9cd04cd41eb6efcfbd91658519bf520b90107f767d126854818485e98cb7ef56804de6950bf4e72098a949d14ea0e4e9f2534cf16cac0aeb970fc5c39f37e93910d5c99ac163792260d2280ec5c9a79bf295588ec23f524aae65f800f9c39e338f3d66b1a69e5488e04823eab36ae6ec6a2c5ce133ccd819a2b217b1ab7f4afd1697bb42929b3131358b5421c83f925571934442d0fd0ce3990d4e5d31d8b956f76df3c2f8533e46b892c88692ce009155dd5c7dbe4c86874b95762650f63e4b4aabb41320978b05b80cfe8fa2830904ef6b5c4f7ad46ca5dac151c9077c4d2c6adfe5066a8eb09a9bc6892330ea2b259a53c7137f8498254e1b04bf920c35c5333c4d640b11da60917ae921037b4aedbd6a0fbeeaf88ef6defc830552b4cbe3fe2a844806a48923dd428ea1c8d797bd8e6aabd1d1a8c97c8038b627120a77f4e47fa1f788aa9da268b0ec10fc453cb722685df76547dbf55a16663aa2b2a51e9c52456cccdf682592d1369dd12e3d3cb504e0f2d7004e62c297d5a25d0298045dae8fca8cb795ea57288b85a7e705820087d55ca6c42e920e2aa1174e128622cf64a197fd728cb2949536ba63e8bda8589261f1377caea37302e47228d3708a5666c66ba711d3c0b310a8c47e86d26597299d523c28c90e4feab43e950f398f7b61ccf7e6490d75ba6d8214e2d5ef2d7a088db490e1ebacf4e6eecc896cb1c704f0a8fcdf4ccb5dfa53eaf43d709287f36c10188c19fd59da7d73494de089c1b0a69ee22dcb847001c5317846a876bee1685d11c4db0673ec4c3a12008bb719650525b3c39e2b0469edda93830b3f1bde3e5b0b4637197866bb08c5858cf0d9876e3c7cad54169887bf9c80f9f4be362e1bc8c27f3434e9a918bac355c184bd899b9aebe6be20e70c0c69234342eb8b57aa9ffb7797a32df91cec2bbc90201658ca2297bf1fe68e65363867e1f6ad79b827f363d64fbd3b188d95307d011c4ce5bf4407908c058eeb97ec98dd0ebfdab6b348fa387f2a7573cac25344c983e8fd526c30ee6d59fe99a30c7d7e2864aa22bfa49df5f32da68309cab3ed9c2ce69b6ecb8508ce28a43ebd6c809b8afd07a4606e664965d316f3707a3abee9bcdc32a78031b0171fb565d90c16cd56e5792c0cf618b799715f32538e38f493d4e19ec76fc8a07576a13975706bfc2bb1516c2d18a4385cc37a206eac6c9fb8d073572ba2671d2198abf24fdd0c40d079ae44962c26743b4bf5950ac5ee34c5d7bd60b364ce670958112c37b9829bed7e1327356d6b94af3ba020c2337b2dba37d00af8a128a614390cdde62ce871f948427fb5c187df9a1540a5cc71da1a86144acbfd94bf433f744f0c4f2a675eba3ed251c5b11b08dfefc726c0394a9b75121d88467ed4b2cd69819dfe50693a4a4c8370d3af12f41c0067283bbb5a90044a340fc357a11081a6c13bb9c32d9caa448479fd5f0302b6729ca7233094540b14546d6bcc15771c2686279b34f9c0914f5306d0fabd5979266ea01a17a22507e560dbf904dd62c40e2bccb468710ee4c1caf4e786", 0xcfa}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f0000003040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xfe3d, &(0x7f0000003100), 0x0, &(0x7f0000003140)=""/29, 0x1d}, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2000, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000140)) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000200)=@sco, 0x80, &(0x7f0000002b80), 0x0, &(0x7f00000076c0)=""/156, 0x9c, 0xfffffffffffffffa}, 0x100) socket$kcm(0x29, 0x0, 0x0) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x287d000000000000}, 0x40) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000f80)={0x4, 0x70, 0x7, 0x1, 0xba3a, 0x6, 0x0, 0xfffffffffffffffb, 0x2000, 0x4, 0x3ff, 0x3, 0x100, 0x0, 0x100, 0x100, 0x2000000000000000, 0x5, 0x60169bbb, 0x88e, 0x382, 0xffffffffffffb09c, 0x5, 0x2, 0x1f, 0x0, 0x8000, 0x8000, 0x218, 0x1, 0x100, 0x8001, 0x8, 0x5, 0x1ff, 0x7fff, 0x1, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={&(0x7f0000000080), 0x5}, 0x40, 0xfff, 0x8001, 0x4, 0x5, 0x8b, 0x6b}, 0x0, 0xd, r1, 0x2) 01:05:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120006000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:40 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000008000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:40 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2041.927120][T23638] netlink: 'syz-executor.4': attribute type 6 has an invalid length. [ 2041.938214][T23639] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.1'. 01:05:40 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120007000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:40 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000009000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2042.014780][T23639] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2042.035593][T23641] device nr0 entered promiscuous mode [ 2042.055035][T23649] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.1'. 01:05:40 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:40 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000a000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120008000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2042.572641][T23647] device nr0 entered promiscuous mode 01:05:40 executing program 5: socket$kcm(0x29, 0x7, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:40 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120009000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:40 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000010000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:40 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:40 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002000000000000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x40000000000002, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="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", 0xcfa}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f0000003040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xfe3d, &(0x7f0000003100), 0x0, &(0x7f0000003140)=""/29, 0x1d}, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2000, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000140)) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000200)=@sco, 0x80, &(0x7f0000002b80), 0x0, &(0x7f00000076c0)=""/156, 0x9c, 0xfffffffffffffffa}, 0x100) socket$kcm(0x29, 0x0, 0x0) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x287d000000000000}, 0x40) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000f80)={0x4, 0x70, 0x7, 0x1, 0xba3a, 0x6, 0x0, 0xfffffffffffffffb, 0x2000, 0x4, 0x3ff, 0x3, 0x100, 0x0, 0x100, 0x100, 0x2000000000000000, 0x5, 0x60169bbb, 0x88e, 0x382, 0xffffffffffffb09c, 0x5, 0x2, 0x1f, 0x0, 0x8000, 0x8000, 0x218, 0x1, 0x100, 0x8001, 0x8, 0x5, 0x1ff, 0x7fff, 0x1, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={&(0x7f0000000080), 0x5}, 0x40, 0xfff, 0x8001, 0x4, 0x5, 0x8b, 0x6b}, 0x0, 0xd, r1, 0x2) 01:05:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb12000a000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:41 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000011000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2042.885861][T23694] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2042.921857][T23693] device nr0 entered promiscuous mode 01:05:41 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2042.957358][T23694] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.1'. 01:05:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb12000b000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:41 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000aaaaaa", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:41 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000005c000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2043.477345][T23702] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2043.487344][T23710] device nr0 entered promiscuous mode 01:05:41 executing program 5: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120010000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:41 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000aa000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:41 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:41 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:41 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0xee6e0000, 0x2a0]}}, 0x1b, 0x0}, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000140)=@nl=@kern={0x10, 0x0, 0x0, 0x80000000}, 0x80, &(0x7f0000000280)=[{&(0x7f00000001c0)="d8de9fb257620414c4e215d178ad28612b2445e2aafb271a8f31d988f7e9d832cee27fd1148dcbf575d239c7509373081b6eab3409d1dc4960dfadd4a7572581db48b2b391dc449682cd6a00fe2a198d9902b53b8d71bef31fb14811e8a01133c1c38eda50fe2ec47575b058937b3cea959f39b7c81d63580f7dfd25693b6d90118ee7dedc9d2d4992d536b862cb683b215703eb4a9ad35ed2663f33432463f92e4edec934fded44a32b2cc456d6f79ee4a0b5332c0110e848b388", 0xbb}], 0x1, &(0x7f00000004c0)=[{0xe8, 0x10e, 0x40, "8826f62011216486905adb7825f257bd56c6115961f094234498249d9fa010658201db1da665ef0428a3745f28880ae78179a16bfcb95ceeca0a44ac58c5493cd2e07fd22e24608f9f758b20c45d3fca97669a28e44dbf81f31e889c02106d2c66016864ee65be2719b1600e94295c1f7c92bb0ab41acb4584d6f37200b218832723dc865f6a86cb9aab99590d9d6a837d54a90c838d0c95f07d9ccdab32d6bf64493ccb76e19950f07fca611cbc3cc60448a9d1a62eeaa25ff85c7897490a29b4d9791825ce36ae29bdda541e46d93e70"}, {0xb0, 0x0, 0x6, "b62efef22063561874bdb8a5e8aff79b56fbb0534324834626fee483f4b21978026bdc94f22c395ce5730a4203720594e626863a24090930223c168321e3b8a79ec930a199a441bf0c9e538b3d1359fe218221a2cd3710535ab032b0ef9af0fc2dd57aa292c0e35f49bcfbe7ae8ca397b1063f51e00983fb5b3829d374b11af69129e6d3cfb73d165af6ba1ecee47a17ef34a89ee31755b426"}, {0x98, 0x10c, 0x80, "b3bc30715253f979b09209fc486414dad6f9b6172119c31a43656a4c03fc5e22614d994fcc5635e5b930dbd32897f4c5c10798ec4025a3a8af7cd0c193572d11320effcb993c44ae4a594e93022d54e1aae9d78881d03ea6aa7e61dd4eb699b4c9a7a871a3a8a6830630c88e2727ecf212d2ac670115cfeb67ac3dd2eb552974c9b9d5"}, {0x80, 0x11f, 0x3ff, "2a5fc520e19b549159e4708354cfcdf93fc292eda552a479e7a3f1389d8e7400e3740331014db98bf123331e706545f963d5a930a8d1958f5023292fe563ea4548da209b138ad96282f77c2f1afa22682f7a1c6d5a8d59040bf66eb71b3e90267e4e6fbbe64e42137c9fb48ed5b803"}, {0x78, 0x10b, 0x4, "501499eb640b6b3435d2dd4e0c56687a9d4da8a02a5e16a9d936e94f3d24a9e3daf56dc85a9eecf8b33377b1a4f467ad4e63702aa862f1280801502f8a61d0c82e30cf27808931aea1bbd64d5710f3ce30410603e06d64d10db30fe03bc572452afa375c54"}, {0xc8, 0x0, 0x8, "19f7ad645cd25ac2b1761ce83378f6693c572b08340811663bce017ead81d02571788d4849d869d95e5849a377ebef17497e4e33398fca2d0e3e9dbd4e885bd264f7129dd2f02abef2ca195732bbd6eafdb126481fe372b38ac84089d48db49d83ae07528f05c3d88f23a12e4e2bde16fddff7681e03693e042c9951b632f17c7112aba9c09f58b5e2d2e68becc34624619c129d21d531a2f014b973e2047d74abf7627dea138df6cb4e947f8ed836bae20c"}, {0x80, 0x29, 0x2000, "1323b2d6c4da6b1f549b2a55290e0e2932d072d8e1c43e9818c88c7947dd2e207131c70e7001f00bd0ab34456220f30ecfc707a2fcca78a61bddb7661be92fcdd2fb7e2adc922df7957eb550d196c9a8b30cefe3f4cad5fc51981bc94a625d0ed620a5e50c19bf5f611a43743a999a"}, {0x88, 0x100, 0x4, "9eb914c335e0ca74b6919a96ab5b9dead24493d4b7af4065f40c61022d863ac5bee23d909e321b6c01a73e963b84129d49583b6c5fa41a2b0f5ccd316f8048725e3a6747ba82674e2fc632a856c368ec72d3373843ee2b3f5b8595f558b59de25d2eccb6c546e9bced1100af53bf45bc923b769c53e9"}], 0x4f8}, 0x20000000) socket$kcm(0x29, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000040)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xfff, 0x1, 0x1592, 0x1ff, 0x0, 0x3, 0x80000, 0x6, 0x7, 0x2, 0x2968d8b7, 0x5, 0x1ff, 0x1, 0xbb, 0x2, 0x7, 0x100, 0xb7, 0x7fffffff, 0xbf, 0x81, 0x7fff, 0x6, 0x9, 0x0, 0x1, 0xffffffffffff0001, 0x7, 0x7, 0x3800000000000000, 0x8, 0x2, 0x8001, 0xffffffff, 0x4, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000100), 0x1}, 0x28000, 0x49, 0x1, 0x7, 0xbbc, 0x5, 0x2}, 0x0, 0x0, r1, 0x0) [ 2043.671016][T23733] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 01:05:41 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000030000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:41 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000a8aaaa", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120011000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2043.774311][T23742] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 2043.808761][T23740] device nr0 entered promiscuous mode 01:05:42 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0xa97042418dc4e66) r0 = socket$kcm(0x11, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000002400)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x10000, 0x53e}, 0x80, &(0x7f0000002300)=[{&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="eb6fcda7c687384238badd37650e24524f1e70776e9181fcdd7b19e0cbdee2031ac847b97ec0040a29faeb8331592adcd9f4fa5f08e0caadcb17697db543cb8d0e5ab533b8004918373bb0640afa2983dd5bad25eb18", 0x56}, {&(0x7f0000001240)="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", 0x1000}, {&(0x7f0000002240)="40f4697db3925ccc66ef4679844542773e620eba4873c9c2e3e0a747380d85fce8ab857c10028bc3681af7b99b7caf11cac7169b0fa275c13e7fa6a02ded89efb259970dbd3e2d295535f7540e38b20274f0b5c1cad67f5164a679c4e6f5505d336a36d2856fe4f78b16e00567818a0d862aa0e314a6e42a13820f449c2253a23d1c4a363477101813", 0x89}], 0x4, &(0x7f0000002340)=[{0x98, 0x18e, 0x7, "a0d77e03c8fde32f9a91ea39f67a1523c769234afa9743bd346f14099bad1bb88d553e9d570a5f324f3782486a8c1c52ed560a82e591804401686ca031ff45c02843373bf985083dbf95e0395359529b209791b157f3136f540dc32c7f9b14d8f42cb594b3e370b837363f4f28b4ef91faa35c0ab8a134374470c011103f250a66cd"}], 0x98}, 0x8004) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000080), 0x4) close(r0) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f00000000c0)=@un=@abs={0x1, 0x0, 0x4e23}, 0x1f}, 0x0) 01:05:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120012000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:42 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2044.375405][T23765] device nr0 entered promiscuous mode 01:05:42 executing program 5: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:42 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000a0030000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120014000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:42 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:42 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:42 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'hsr0\x00', 0x600}) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='\'-&\x00', r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!J\xef\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\x00\x00\x00\x00\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) [ 2044.506312][T23785] netlink: 'syz-executor.4': attribute type 20 has an invalid length. 01:05:42 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000050000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:42 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb12001d000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2044.643783][T23791] device nr0 entered promiscuous mode [ 2044.761442][T23802] netlink: 'syz-executor.4': attribute type 29 has an invalid length. 01:05:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb12005a000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:43 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:43 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000060000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:43 executing program 5: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:43 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000008000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120001240200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:43 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000070000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:43 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40000000100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f00000001c0)=0x40000000100) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x8, 0x7f, 0x1, 0xffffffff, 0x0, 0x3ff, 0x80, 0x2, 0xfffffffffffffffb, 0x1, 0x4, 0x9, 0xd7e, 0x1, 0x3, 0x10000, 0x75, 0x100000001, 0x401, 0xffff, 0xffffffffffff0000, 0xffff, 0xfffffffffffffc01, 0x7, 0x8000, 0x80000001, 0x9, 0x4, 0x6, 0x8, 0x3, 0x101, 0x7, 0x1, 0x1, 0x80000001, 0x0, 0x1ff, 0x6, @perf_config_ext={0x800, 0x1}, 0x8, 0x0, 0xcef5, 0x1, 0x5, 0xdd, 0x10000}, r2, 0x1, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 01:05:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003020200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:43 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000008001", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:43 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000090000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2045.648674][T23838] device nr0 entered promiscuous mode 01:05:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003030200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:44 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000a0000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:44 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000008002", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2046.233766][T23858] device nr0 entered promiscuous mode 01:05:44 executing program 5: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003040200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:44 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000200", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:44 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000110000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:44 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:44 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000015c0)={0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001640)={&(0x7f0000001600)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000001680)={r1, r2}) r3 = socket$kcm(0x10, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000040)={r3}) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ec00000000000000050f00000000000000050009000e000400dc050000050005001204", 0x2e}], 0x1}, 0x0) 01:05:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003050200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:44 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000003f0000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:44 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000300", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)={0xf, 0x0, 0xfff, 0xd60585c, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x3, [], 0x0, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000000500), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000600), 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2000000000003b, 0x2}, 0x3c) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') sendmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="1fcb8278a0b9fcd2495f045d65706e88621aa1aa1164784ffc64d89a3f4620aac6f29023604236b94dbeea8267315ab8a56f39b470488ce24f3a77d3632fe5eb741f42", 0x43}], 0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x158}, 0x4040000) [ 2046.595328][T23891] device nr0 entered promiscuous mode 01:05:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003060200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:44 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000400000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2047.080567][T23910] device nr0 entered promiscuous mode 01:05:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003070200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:45 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000400", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:45 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000005c0000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:45 executing program 5: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000380)={&(0x7f0000000080)=@x25={0x9, @remote}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/164, 0xa4}], 0x1, &(0x7f0000000300)=""/110, 0x6e}, 0x40000000) socket$kcm(0x29, 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001e00)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000001e40)='cpuset.effective_mems\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008106e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000f00b800069903000000050015000200812fa80016000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000001dc0)={&(0x7f00000003c0)=@generic={0x10, "13693fa8c0284a4ce78e89e66e7573ed018d9e6477d26c645dbeee783aedd354d4017ca6a2d82970c9639a434a69489fec073fe25f7b27bf4f4e9498d9cbd70a19bd975a789410fc0aab642f40e181da9ad1d20e2b182c4a925ca4eab201f8a49dc54141d3a527edecba0318bc04d2162dc1d5a98079d2747437c4eab714"}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000440)="cfd6647e71fef576055b4033a4bac183c7f7c9505034b98ff548804b580a998aeefc45864b08aefc978a61b265318411858cec265c7716e46b85375b29c707e55995fc80f5404525be", 0x49}, {&(0x7f00000004c0)="999aaa5e346aa9a244f42448bf705ccd5e459ba2a4f4f92003bf0d3aa042d43265afb9bb5a736952b389dd8e1142de07aad03d84315d42bdf70917e73afc9f749a616622e2c791e15dff05361430da0225807b3594a5da09e1e11c50850beff5edfcac9c334d189ca3b055b51180f0dc5c13c85cfaa0f8cb3cc8e8a9d3e202cf7d9c9e9ec73cfd538d81a481db9301", 0x8f}, {&(0x7f0000000580)="0bc390980a3e005a5d4c1276969a54f273c15e36e3e5c49e04e5a1d7e3659536449ed73086cc4ebfad0b325b50c0900779ff33ce6ef6dad8c95dbd48eebb5ab0d55b7893ff25f3a761810e86bbc358f4dd337ca5a1a55efee6f32d0672aa88c6bbc2bb97dabf24ec0aaa25d8c616e01f9f0e83b0e3079081a6fd0114d55410c9ad71757f5e8128cc3d454f358e029e3f4c0a15f11a36bd6a10e7b3617cdc26bba8c91d", 0xa3}, {&(0x7f0000000640)="6199c65a4c785a71c9f4ce29ce74dac8c2f0b9564c1b02a25054010e9a44f9ef69bd14dab0a61fb94c66015d7e02ca292029868cdf097a6396118b24a165801f33374e35f5bb47dfdcf1d353f7bb877a763405141a21f757e3e7dc465ff087493a1c0a8bef5006eee3e441703a62046e9bbe49d687ff4aeb6e566e1a64375f54ae2838", 0x83}, {&(0x7f0000000700)="2083519c7626fe5358451b", 0xb}, {&(0x7f0000000740)="e4fd325bda4e9ed377c7df6b00863df99e9fcac8562c83e38690c049b8504b4c340f7f60611e351e0721cc8f921902feaf32d888d74a9b654235694e335bb0f5613a339850", 0x45}, {&(0x7f00000007c0)="e4e82f540685f7ac5842477a0ed14c74693fcfafb6e25b328ed080e70d38ca3a075b77653e6c67a8721514e20dabcc2d56099135fb787e32e084d48439d0d927becaf5d009081678fe5fab9c3cfab3367943e73de48e06d44b0c747dffe809a6517822cde82d6326cfb43ce0134f", 0x6e}], 0x7, &(0x7f00000008c0)=[{0x108, 0x117, 0x5, "af197504b139787e838d1c4011ba9691b84909bf0ef0d1e54940521fbcca532c6f5f1ad615146be64fb80ecfe277f537e71bf3a2677cd4030404de49c920e87d961af971c6f61e950e03472727e7cdb0f878ed6510741a6ceca508188c9f80216b62ef137c90cec0a4159d5ec2caa9d452d5df9454eb06912d97fea4d692976ebf1ce97396c801b80de166e350b2fac49fc9089c3d52de092cd0e3b5f447fea22ae42dc5086964c356186469b84a94d9dbea6c46dfa800d664255f95afe4bf9da8c96d88c531c9b5210622a30aa69ab5a4d8de5dd7a1d18551b005188cd3b3bb65ea6c29b5d7c50f0921d4550ad90f13bd4b"}, {0x98, 0x108, 0x2, "4c91639bbb19ea51718e18cd6f6a13d8d2458ce67e4244798c023a6f3de3695b135de6e6ba58a30307df3aa25d1b02c5db849f9370bc99d8e03e8b0fd645eed95cdb8c4972409407e79b073b5339d3041100c46e6a6df12c4e7095c9141761481f3eb098d4bf4c5598be5589f730f869938e6405add22a7580ff6a7eeeec245e0db5182ac1ef44cb"}, {0x1010, 0x13a, 0x81, "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"}, {0xf0, 0x29, 0x400, "955a9705c821610bf0e2021798acf68ea6ef3c5065974d93ab20073650a35e14362b53b3661c3d8de7ef8785c510b76181d475354b23f6355ce706ea74ccf815c79dff23f8d1810f8e3525d3374ff1636f920185ea327fa918a9152064f43918b3fc94aa9a990d5c5858c894adb2b0df9a5a8c2822c93c7abdc54192b8780c6016fb565baa0891e9bf895ae286bc304e94ece5abc8fc7e7b81405e15a1ba65889d41dc0b2f17c960e4fc4ff9966714965374aa272a7824346c44b3c620f1ea0077a82d496618da3f50a2a49622fbb736d17d898bd2628a5281"}, {0x70, 0x12f, 0x9, "954446b838a772e36fa2cf2bf2d85ebdd220001fb6342279f351280e14fd06a376dc3770ebed7d20034d8d928eb346f02555e0acf4e75eb28789b430caeea997586bd0c1fe4fdc9e699b69d2c55e58a6f7076a92a811dbbcb52beb623a03f7"}, {0x48, 0x10d, 0xfffffffffffffffd, "2e39da4bd0afdf8f46af2ec97ebe14e94ebad6d44cd678ff3125f48a992597c46c84f055b3a4b5ce722c61ade66bd7bc28f08e612e"}, {0x78, 0x10f, 0x1, "9e77788eaa1f7d313f1afbd080b085b1056128909428106b2c963669d4777ee8eb3ecb42de12f53e191e32d78feb714a3b713d7a24aab2c078133c1cf978e769128fd5f783656f5b1bf5c08177dff71e5d29f8da16c30c01fc3ea46838dadecc8d344fd9b941d82e"}, {0x38, 0x11b, 0x5, "d7949998f00ef0743b20775b883170e8049f404a6949b1086f63e730597b34cfb6"}, {0xe0, 0x103, 0x3, "fcc11d172f1a57d666ea047b28b0ea25cf4b3bad23a1121f74544e4faf232f5139dfc99e6149d6feb96674a9d3b662cb89d1df14f111ea8029b245612ab4a28f3ef6273ae4240baa522d2ada3d83abfb98d7a3bbcfe242b561b3e673f722383efc65c4ad5180ef43f55cb533198eb1e9357f0f606ff8871ce04550688f0c5e3f12b10a9c38e0d2a93e3d30d021d04e1cd10c2982854b279b37da8aebccce1172ea789a6d04aeb837e9ec4579f1209d32f4ce42131b20beb70dc052e1d8250e1563c5a2e659a7745c56"}], 0x14e8}, 0x800) recvmsg$kcm(r0, &(0x7f00000031c0)={&(0x7f0000001e80)=@nfc_llcp, 0x80, &(0x7f0000003100)=[{&(0x7f0000001f00)=""/73, 0x49}, {&(0x7f0000001f80)=""/84, 0x54}, {&(0x7f0000002000)=""/225, 0xe1}, {&(0x7f0000002100)=""/4096, 0x1000}], 0x4, &(0x7f0000003140)=""/112, 0x70}, 0x102) 01:05:45 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb1200030a0200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:45 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000500", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:45 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000fe800000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2047.425050][T23938] device nr0 entered promiscuous mode [ 2047.478796][T23943] netlink: 'syz-executor.1': attribute type 15 has an invalid length. 01:05:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb1200030c0200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:45 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000080fe0000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:45 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000600", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:45 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000700", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb1200030e0200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:46 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000400300000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2047.802043][T23959] device nr0 entered promiscuous mode 01:05:46 executing program 5: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2048.153595][T23986] netlink: 'syz-executor.1': attribute type 15 has an invalid length. 01:05:46 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, 0x0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000380), 0x0}, 0x18) unlink(&(0x7f0000000400)='./file0\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r1, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28, &(0x7f0000000200)}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='rdma.current\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r3, &(0x7f0000000480)="cf42d8260d6ea554f1cad603ef5e178426041767cb2d1d9aa414b13e57c008e4d1d23d8fdc6c517c0779a61e15cd5d35fb61c7eaac4709c5c22fad4d23a13668bc930b2a4fa1862109bc4ebcebc38050be40ff3f374ba9c30f7c785a1816e7fee0143712f79ec8d75567e63dd20c26bfce3853be53fce5c1f5c388f602014ba62427ebbc0e02a839db1514b81c1d5d6db98caacbde343e006ddca8a6bf9a15cb040fea3b9c6cc24db8d92077a48462a227c8e7dcc2b2f4aaeff7aa5331cf7a5af10aba4d00f698c6724d1cd5ed9932b734c441cf8dc49c00d64bc5df1e", &(0x7f0000000580)=""/206}, 0x18) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000003c0)={0x1, 0x0, [0x0]}) write$cgroup_int(r4, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="010400006f7279029a111890f37ebfd61d7bd0e248b6ccb0f28ec4cdbd2dada3bc1bd74776f3e8c904213887d92cf60a88d93c6d5cbb3728338348926916eef51fb2e41d272b16bcbb173413d543716640accc4d0200000000000000e293de918a33ca93e629e583df9a3fa99adc636585ff92b581e74ee6a92cc500849fef1d74a100"/148], 0x9e) 01:05:46 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb1200030f0200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:46 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000001000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:46 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000800", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003100200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:46 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000900", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:46 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000034000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:46 executing program 5: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2048.481141][T24007] device nr0 entered promiscuous mode 01:05:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003480200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:46 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000a0008000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:46 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000000)=ANY=[@ANYBLOB='7:2\t'], 0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f0000000480)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) openat$cgroup_ro(r3, &(0x7f00000004c0)='cpuset.effective_mems\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000200), 0x80, &(0x7f0000001700)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x140) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000002c0)='memory.stat\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x19d) r4 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="2b8e730000000000000000000000000000005160982101c683f7938b55e36befdf51007bc1cc4ca66662b33aad1d2fc018628b0736cc52e7ba0cdfad3af354333af167e414e3888a982d7b436d2fbfe3044df028165ef7872c3ccb9e38b795c3017af0b48b2c8d87f1d61d9fadd399a3685b2e755c07f5d850a939ef66d99fa1c4094a7823ce85276bfd010000000000000047bea4ba0b"], 0x97) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x4, 0x0, 0xfffffffffffff13f, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xfffffffffffeffff, 0xfc, 0xf67d, 0x0, 0x10001, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) recvmsg(r3, &(0x7f0000014280)={&(0x7f0000013e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000014180)=[{&(0x7f0000013e80)=""/41, 0x29}, {&(0x7f0000013ec0)=""/68, 0x44}, {&(0x7f0000013f40)=""/142, 0x8e}, {&(0x7f0000014080)=""/252, 0xfc}], 0x4, &(0x7f0000014200)=""/80, 0x50}, 0x40000101) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x70, 0xffffffff, 0x1, 0x2, 0x6c, 0x0, 0x20, 0x41044, 0x8, 0xfffffffffffffffb, 0xffff, 0x3, 0x8001, 0x8001, 0x3, 0xfffffffffffffff7, 0x7, 0x6, 0x80, 0x8, 0x0, 0x0, 0x5, 0xf8, 0x4, 0x20, 0x1, 0x0, 0x6, 0xda, 0x6e4, 0xe83, 0xfe, 0x100000000, 0x101, 0x2, 0x4, 0x0, 0x7, 0x3, @perf_config_ext={0x2, 0x7fffffff}, 0xa, 0xff, 0xdb, 0x6, 0x40, 0x7, 0x4}, 0x0, 0x6, r0, 0x8) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) 01:05:46 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000a00", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:47 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb1200034c0200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:47 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000a0018000000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e432600000000fffffff08ef9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) close(0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) socket$kcm(0xa, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0xffffffb5) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0x1, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r2, 0x1000, 0x10}, 0xfffffca1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 01:05:47 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000001000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:47 executing program 5: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:47 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000001100", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003600200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:47 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000001000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:47 executing program 5: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:47 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:47 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000002000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:47 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000005c00", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:47 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, &(0x7f0000000380), 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @loopback}, 0x80, 0x0}, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000040)) recvmsg(r0, &(0x7f0000001580)={&(0x7f0000001300)=@hci, 0x80, 0x0}, 0x12103) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000000)) 01:05:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003680200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2049.687815][T24088] device nr0 entered promiscuous mode 01:05:48 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000000000aa00", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:48 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000003000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb1200036c0200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:48 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) socket$kcm(0x10, 0x2, 0x4) socket$kcm(0x11, 0xa, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r1 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r0, 0x10, &(0x7f0000000140)={&(0x7f0000000080)=""/59, 0x3b, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={r0, 0x10, &(0x7f0000000740)={&(0x7f0000000640)=""/239, 0xef, r2}}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000300), 0x4) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(r4, &(0x7f0000000540)=ANY=[@ANYBLOB="006d656d6f72792073fb69c5fff995b7a10848ca854a95b0b7f854c499d0e4480b3ebbb8fa96d26eeaf7debb91aaa04f33365079c615006e8554e31f04fd1260e789b92ffead7eb60bb2f582411c2c383118e95041bf8b9bdbc54f8612037b3fa7f0e0c1f7e035dae268174bfe9b0460a9f8369cd6b356f67b5a834fa2e363e8a135c4e5ddeba08cabea03f170a07e80d4d382e1b63469c7b7bacc08c5af05a2e18d48335b3f2ec860aea078ead8342662e6cc84d1d9b4e1bb1217b3f4cc308e98532a85e7a86e3a34e1961c8a3dd863a4e8dc9722e2b151a3f058319f22771bf3f91f2dcae2a86a77cadad3a33511eda206db7512af9fe19d"], 0xf9) sendmsg$kcm(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000400)="a0717f0a505894f68be22979a77a8fe2696adb17c6f931cbcfbe235708d6ce143c165605c9e289554d382d49703a096e356e745e1e61c647d2107880bc5844d0f0fd21e83d93007b1de4d06509c1418220ae889fcacdb337146eedde1ee6754831190e673618ecaa52a31a155e348b510e0c578ef0f0e77a45df8ac1a5df474b7efb7c238b47887b6b90b01cf7a410827af8acdafb71c5ab98717c4fa24c348c47db3708eb0b420d4bba9bfd3388e4f5c8b307203cc7fee06c09c3716247fa35db45ec6cac9493e68a09b9a38f5a1bd91c3f201d", 0xd4}], 0x1}, 0x1) 01:05:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003740200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:48 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000004000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2050.143204][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2050.149328][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2050.155382][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2050.161191][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:05:48 executing program 5: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:48 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:48 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000003", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb1200037a0200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:48 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000005000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x8000000000000002, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002d008100e04cdd6a9df09fe668c865160b000000cab96eff4f65f35a0e00da1b40d819a9060015000000", 0x2e}], 0x1}, 0x0) close(r0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) [ 2050.493680][T24139] device nr0 entered promiscuous mode 01:05:48 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000006000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003fc0200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2050.572151][T24147] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 01:05:48 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000005", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2050.694864][T24158] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 01:05:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000300000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:49 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000580)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0xf}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000380)={0x1, 0x5, [@dev={[], 0x2b}, @empty, @local, @remote, @empty]}) close(r4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={r1, 0x3, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) r5 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f00000000c0)) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNGETFILTER(r6, 0x801054db, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x200000007) write$cgroup_int(r6, &(0x7f0000000000)=0x1, 0xfdef) recvmsg$kcm(r5, &(0x7f000000da00)={&(0x7f000000d780)=@hci, 0x80, &(0x7f000000d8c0)=[{&(0x7f000000d800)=""/17, 0x11}, {&(0x7f000000d840)=""/98, 0x62}], 0x2, &(0x7f000000d900)=""/233, 0xe9}, 0x140) socketpair(0x9, 0x5, 0x0, &(0x7f0000000280)) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'bcsf0\x00', 0x400}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x5, 0x14, 0x5, 0x1ff, 0x0, 0x1, 0x10200, 0x4, 0x0, 0x10001, 0x6, 0x0, 0x0, 0x1, 0x0, 0x642, 0x0, 0x0, 0x2, 0x3, 0x1ff, 0x3, 0xc3b, 0x7, 0x5a81, 0x4, 0x13, 0x400, 0x43f2da42, 0x62fb, 0x54ab, 0xfffffffffffffffe, 0x0, 0xe9d, 0xe57, 0x9, 0x0, 0x1, 0x4, @perf_bp={0x0}, 0x0, 0xb, 0x8, 0x7, 0x9, 0x8, 0x20}, 0x0, 0x0, r0, 0x2) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000440)={r1, r1}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) 01:05:49 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000007000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2050.955047][T24177] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:49 executing program 5: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:49 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:49 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000006", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:49 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000008000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000900000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2051.252555][T24182] device nr0 entered promiscuous mode [ 2051.279451][T24187] device nr0 entered promiscuous mode [ 2051.342990][T24191] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:49 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000007", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:49 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000009000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000a00000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2051.546759][T24209] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:49 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000009", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003001100000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2051.752550][T24221] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 2051.809630][T24200] device nr0 entered promiscuous mode [ 2052.231876][T24179] device nr0 entered promiscuous mode 01:05:50 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x1000000000003d, 0x75) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 01:05:50 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000000a000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:50 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000000000000a", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003003f00000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:50 executing program 5: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:50 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2052.417015][T24230] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003004000000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:50 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000010000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:50 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000011", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2052.510719][T24236] device nr0 entered promiscuous mode 01:05:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005a00000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2052.650683][T24254] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:50 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000000000003f", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:50 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000011000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2052.802151][T24264] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:51 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0x1, &(0x7f0000000080)='\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x5, 0x2, 0x4, 0x9, 0x0, 0x51b8, 0x298d5, 0xa, 0xfffffffffffffffa, 0x101, 0x0, 0x7ff, 0x3, 0x9, 0x80000001, 0x1537, 0xc2b, 0x0, 0x4, 0x3, 0x1, 0x15c7f2b6, 0xffff, 0x7f, 0x800, 0x3, 0xc12e, 0x7, 0x2, 0x9, 0x1, 0x3f, 0x7fff, 0x1, 0xff, 0x100000000000000, 0x0, 0x8, 0x2, @perf_config_ext={0x9e3, 0x1f}, 0x252, 0x1000, 0x8, 0x1, 0x10001, 0x6, 0x1ff}, r1, 0x0, 0xffffffffffffffff, 0x1) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000013001707ed12806cd20010e505e6a5dd80009d00010800f60000000300f87f0000640000000000000000", 0x2e}], 0x407, 0x0, 0xfffffffffffffe02, 0x2}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') 01:05:51 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000003f000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:51 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000040", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003006300000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:51 executing program 5: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:51 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2053.091954][T24275] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:51 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000000000005c", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000300000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:51 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000040000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:51 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x181002, 0x0) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000080)) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) socket$kcm(0x29, 0x2, 0x0) [ 2053.304974][T24291] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:51 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000000000fe80", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000900000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 2053.390074][T24294] device nr0 entered promiscuous mode 01:05:51 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000005c000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2053.566157][T24311] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:51 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000000000080fe", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000a00000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:51 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000ffffff8d000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:52 executing program 5: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:52 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:52 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000040", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003001100000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:52 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000008000a0000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:52 executing program 1: socket$kcm(0x10, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r2 = perf_event_open$cgroup(0x0, r1, 0x6, 0xffffffffffffffff, 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080)=0xe0, 0x297ef) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000140)='m\x04\x90\t\x94\x15\x8f\xcdmU\x922\xe2O\x1e\a\x00\x00\x00\x06\x05\x00g\xd4\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x9, 0x4) 01:05:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005a00000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:52 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:52 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000008001a0000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2054.248618][T24351] device nr0 entered promiscuous mode 01:05:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003006300000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:52 executing program 5: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:52 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000003a0000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:52 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000003", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:53 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000001d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:53 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000000000a000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:53 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000fffffff5000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:53 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x300) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="ec6c65176f727920d53f50b6dec650c2aad58ab327baf7efdf5013bb21be3ec98e75d340c111bf32a9fa010049d336523268a0f514d6853434010596337f79b35028058c96b89d582cf44ee7ee367ac6494b74702e2883810cc71486b234213e4ea8fdac7bc22756d788cae55d83e8f0d4a6885ce777817661c5d43d338b5a02d7385c22a4c45298c223c3bbe72ff093956a76be0adbde8d5d7a3d"], 0x9b) r3 = getpid() socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x7, 0x3, 0x6, 0x8, 0x0, 0x10001, 0x40080, 0x2, 0x200, 0x7, 0x8, 0x8, 0x6, 0x10001, 0x4, 0x100000001, 0x0, 0x0, 0x1, 0x6, 0x0, 0x1f, 0x5, 0x1, 0x8000, 0x1, 0x1, 0xfffffffffffffff9, 0x9e, 0x7f, 0xe8, 0x7, 0xfff, 0x7, 0xffffffffffff8001, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x4}, 0x40, 0x2, 0x0, 0x0, 0xfffffffffffffffd, 0x3f, 0x81}, r3, 0x7, r1, 0xa) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:05:53 executing program 5: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000002d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:53 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000000000a001", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:53 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000000080fe000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2055.102264][T24404] device nr0 entered promiscuous mode 01:05:53 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff}, 0xc) r1 = socket$kcm(0x29, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x3}, 0x20) recvmsg$kcm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=""/114, 0x72}, 0x21) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev, 0xc}, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000740)}, 0x20004040) socket$kcm(0x29, 0x5, 0x0) 01:05:53 executing program 5: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000003d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:53 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000007fffffff000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:53 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000000000000000a002", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000004d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:53 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:53 executing program 5: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:53 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000005d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:54 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c21372000000008dffffff000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2055.842920][T24453] device nr0 entered promiscuous mode 01:05:54 executing program 5: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000006d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:54 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000f5ffffff000000", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:54 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:54 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x1, 0x4, 0x0, {0xa, 0x4e24, 0x6fc8, @ipv4={[], [], @multicast1}, 0x40000}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9cabbf0451dc6e29419b80008100254588a8", 0x12}], 0x1a4}, 0xffffffffffffffff) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000780)=@can={0x1d, 0x0}, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/120, 0x78}, {&(0x7f0000001880)=""/51, 0x33}], 0x3, &(0x7f0000001900)=""/4096, 0x1000}, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000029c0)={&(0x7f0000002940)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c000000070000000c00000000002be757b6000018000e07080000000000000700000000007f6161303000"], &(0x7f0000002980)=""/3, 0x3b, 0x3, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000002a00)={0x17, 0xe77a, 0x8, 0x0, 0x0, r1, 0x6, [], r2, r3, 0x2, 0x5}, 0x3c) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x9, 0x2}, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x6, 0x4, 0x347}, &(0x7f0000000180)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x100000000}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r4, 0x4) 01:05:54 executing program 3: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) 01:05:54 executing program 5: socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b8080000"], 0xb107) [ 2056.311563][T24486] validate_nla: 9 callbacks suppressed [ 2056.311575][T24486] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:54 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:54 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200000000ffffffffa00300", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000007d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:54 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2056.563597][T24497] device nr0 entered promiscuous mode [ 2056.601676][T24511] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000008d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:54 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000010", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2056.790311][T24521] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 01:05:55 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008000060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c2137200"/92, 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 01:05:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000009d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 01:05:55 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000200)=@nl=@unspec={0x0, 0x3f000000, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="235db863768606681d212f629c75adfa4208d51e67688d024aface690300d846ed2fa163e15ffb500000008002060000fffeff08d4f83047fda99583c87bcfaf90d71978740a8bd45ff8a106da98c213720000000000000000000340", 0x5c}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2057.018590][T24533] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 2206.623362][ T1042] INFO: task syz-executor.1:24499 blocked for more than 143 seconds. [ 2206.631647][ T1042] Not tainted 5.2.0-rc3+ #15 [ 2206.637031][ T1042] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2206.645763][ T1042] syz-executor.1 D27616 24499 10784 0x00004006 [ 2206.652086][ T1042] Call Trace: [ 2206.655554][ T1042] __schedule+0x7cb/0x1560 [ 2206.660099][ T1042] ? __sched_text_start+0x8/0x8 [ 2206.665031][ T1042] ? prepare_to_wait_event+0x14f/0x720 [ 2206.670539][ T1042] schedule+0xa8/0x260 [ 2206.675224][ T1042] synchronize_rcu_expedited+0x54e/0x5b0 [ 2206.680857][ T1042] ? rcu_exp_wait_wake+0x450/0x450 [ 2206.686037][ T1042] ? finish_wait+0x260/0x260 [ 2206.690633][ T1042] ? lock_downgrade+0x880/0x880 [ 2206.695532][ T1042] ? find_held_lock+0x35/0x130 [ 2206.700440][ T1042] ? mutex_trylock+0x1e0/0x1e0 [ 2206.705556][ T1042] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2206.711105][ T1042] ? ___might_sleep+0x163/0x280 [ 2206.716023][ T1042] synchronize_net+0x3b/0x60 [ 2206.720620][ T1042] packet_release+0x99b/0xc60 [ 2206.725528][ T1042] ? packet_set_ring+0x1b50/0x1b50 [ 2206.730635][ T1042] ? lock_acquire+0x16f/0x3f0 [ 2206.735359][ T1042] ? __sock_release+0x89/0x2a0 [ 2206.740113][ T1042] ? kasan_check_write+0x14/0x20 [ 2206.745233][ T1042] __sock_release+0xce/0x2a0 [ 2206.749830][ T1042] sock_close+0x1b/0x30 [ 2206.754046][ T1042] __fput+0x2ff/0x890 [ 2206.758039][ T1042] ? __sock_release+0x2a0/0x2a0 [ 2206.762886][ T1042] ____fput+0x16/0x20 [ 2206.766949][ T1042] task_work_run+0x145/0x1c0 [ 2206.771589][ T1042] get_signal+0x201b/0x24b0 [ 2206.776165][ T1042] ? ksys_dup3+0x3e0/0x3e0 [ 2206.780572][ T1042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2206.786907][ T1042] ? debug_smp_processor_id+0x3c/0x280 [ 2206.792426][ T1042] do_signal+0x87/0x1900 [ 2206.796769][ T1042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2206.803663][ T1042] ? fput_many+0x12c/0x1a0 [ 2206.808145][ T1042] ? fput+0x1b/0x20 [ 2206.811960][ T1042] ? setup_sigcontext+0x7d0/0x7d0 [ 2206.817085][ T1042] ? __ia32_sys_sendmmsg+0x100/0x100 [ 2206.822399][ T1042] ? exit_to_usermode_loop+0x43/0x2c0 [ 2206.827911][ T1042] ? do_syscall_64+0x58e/0x680 [ 2206.832770][ T1042] ? exit_to_usermode_loop+0x43/0x2c0 [ 2206.838257][ T1042] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2206.843855][ T1042] ? trace_hardirqs_on+0x67/0x220 [ 2206.848979][ T1042] exit_to_usermode_loop+0x244/0x2c0 [ 2206.854366][ T1042] do_syscall_64+0x58e/0x680 [ 2206.859046][ T1042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2206.865044][ T1042] RIP: 0033:0x4592c9 [ 2206.869062][ T1042] Code: ff ff ff 48 8b 49 30 48 89 4c 24 10 48 8b 50 08 48 89 91 20 01 00 00 48 8d 50 08 84 02 48 89 ca 48 89 50 08 48 89 04 24 e8 34 <63> fb ff 48 8b 44 24 10 48 8d 88 10 01 00 00 48 89 4c 24 18 48 89 [ 2206.888896][ T1042] RSP: 002b:00007f6ae7235c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 2206.897491][ T1042] RAX: fffffffffffffe00 RBX: 0000000000000003 RCX: 00000000004592c9 [ 2206.905539][ T1042] RDX: 0000000000000000 RSI: 0000000020002900 RDI: 0000000000000003 [ 2206.913559][ T1042] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2206.921531][ T1042] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6ae72366d4 [ 2206.929615][ T1042] R13: 00000000004c6629 R14: 00000000004db3c0 R15: 00000000ffffffff [ 2206.938124][ T1042] [ 2206.938124][ T1042] Showing all locks held in the system: [ 2206.946067][ T1042] 1 lock held by khungtaskd/1042: [ 2206.951092][ T1042] #0: 000000002a7e4ff5 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 2206.960974][ T1042] 2 locks held by rsyslogd/8832: [ 2206.966145][ T1042] #0: 0000000001d1cc42 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 2206.975145][ T1042] #1: 00000000dbf6c029 (logbuf_lock){-.-.}, at: is_bpf_text_address+0x0/0x170 [ 2206.984249][ T1042] 2 locks held by getty/8922: [ 2206.988914][ T1042] #0: 00000000c89deb76 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2206.998468][ T1042] #1: 00000000b49f7fa4 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 2207.008246][ T1042] 2 locks held by getty/8923: [ 2207.012914][ T1042] #0: 000000000ec2f386 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2207.021986][ T1042] #1: 000000005950c8f3 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 2207.031634][ T1042] 2 locks held by getty/8924: [ 2207.036559][ T1042] #0: 000000009732b693 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2207.046027][ T1042] #1: 0000000056795daa (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 2207.055676][ T1042] 2 locks held by getty/8925: [ 2207.060348][ T1042] #0: 0000000091cef865 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2207.069837][ T1042] #1: 0000000062c6b6cc (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 2207.079669][ T1042] 2 locks held by getty/8926: [ 2207.084402][ T1042] #0: 00000000befa2a20 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2207.093433][ T1042] #1: 00000000aeb82624 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 2207.103175][ T1042] 2 locks held by getty/8927: [ 2207.107950][ T1042] #0: 000000009bb7400b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2207.117088][ T1042] #1: 00000000d540f174 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 2207.126716][ T1042] 2 locks held by getty/8928: [ 2207.131498][ T1042] #0: 00000000ee0c8bb2 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2207.140543][ T1042] #1: 00000000f3fc05d4 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 2207.150226][ T1042] 1 lock held by syz-executor.1/24499: [ 2207.155781][ T1042] #0: 00000000b38e02c7 (&sb->s_type->i_mutex_key#11){+.+.}, at: __sock_release+0x89/0x2a0 [ 2207.166103][ T1042] [ 2207.168437][ T1042] ============================================= [ 2207.168437][ T1042] [ 2207.177041][ T1042] NMI backtrace for cpu 1 [ 2207.181369][ T1042] CPU: 1 PID: 1042 Comm: khungtaskd Not tainted 5.2.0-rc3+ #15 [ 2207.188896][ T1042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2207.198945][ T1042] Call Trace: [ 2207.202238][ T1042] dump_stack+0x172/0x1f0 [ 2207.206559][ T1042] nmi_cpu_backtrace.cold+0x63/0xa4 [ 2207.211756][ T1042] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 2207.217391][ T1042] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 2207.223377][ T1042] arch_trigger_cpumask_backtrace+0x14/0x20 [ 2207.229316][ T1042] watchdog+0x9b7/0xec0 [ 2207.233613][ T1042] kthread+0x354/0x420 [ 2207.237746][ T1042] ? reset_hung_task_detector+0x30/0x30 [ 2207.243291][ T1042] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2207.249529][ T1042] ret_from_fork+0x24/0x30 [ 2207.254088][ T1042] Sending NMI from CPU 1 to CPUs 0: [ 2207.259593][ C0] NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0xe/0x10 [ 2207.260921][ T1042] Kernel panic - not syncing: hung_task: blocked tasks [ 2207.274711][ T1042] CPU: 1 PID: 1042 Comm: khungtaskd Not tainted 5.2.0-rc3+ #15 [ 2207.282244][ T1042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2207.292477][ T1042] Call Trace: [ 2207.295901][ T1042] dump_stack+0x172/0x1f0 [ 2207.300239][ T1042] panic+0x2cb/0x744 [ 2207.304137][ T1042] ? __warn_printk+0xf3/0xf3 [ 2207.308818][ T1042] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 2207.314500][ T1042] ? ___preempt_schedule+0x16/0x18 [ 2207.319662][ T1042] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 2207.326041][ T1042] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 2207.332202][ T1042] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 2207.338351][ T1042] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 2207.344739][ T1042] watchdog+0x9c8/0xec0 [ 2207.348904][ T1042] kthread+0x354/0x420 [ 2207.353084][ T1042] ? reset_hung_task_detector+0x30/0x30 [ 2207.358624][ T1042] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2207.365116][ T1042] ret_from_fork+0x24/0x30 [ 2207.370988][ T1042] Kernel Offset: disabled [ 2207.375367][ T1042] Rebooting in 86400 seconds..