0) 21:13:29 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000f40)='cgroup\x00controC\x12\x12\x98\xd1l\x06\x00\x00\x00H=\xc10U\xa0\x8b\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xcf\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6I6#\x87\xcbB7/\x1e\x14WT\xf8\xcd\x94\xb0N\x89\x85\xb2S\xffE\x14q\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98d\x1e0xffffffffffffff9c}) recvmsg$kcm(r1, &(0x7f0000001b40)={&(0x7f0000000580)=@ipx, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000600)=""/131, 0x83}, {&(0x7f0000001880)=""/160, 0xa0}, {&(0x7f0000001940)=""/148, 0x94}], 0x3, &(0x7f0000001a40)=""/229, 0xe5}, 0x100) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x9, 0xfffffffffffffffe, 0x5, 0x0, 0x4, 0x80000, 0x5, 0x799b, 0x4, 0x401, 0x8, 0x9, 0xc3, 0x1, 0x8, 0x9, 0x5, 0x66, 0x9, 0x0, 0x94, 0x1000, 0x10001, 0x5, 0x9, 0x7ff, 0x6, 0x6, 0xfffffffffffffffb, 0x3, 0xf2, 0x3, 0x8, 0x1, 0xfffffffffffffffc, 0x0, 0x7e, 0x3, @perf_config_ext={0x9, 0x4}, 0x200, 0x487e, 0x6, 0xf, 0xe5e, 0x80, 0x5}, r3, 0xffffffffffffffff, r4, 0xb) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\xe3\x92a\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\t\x1b&!\x982\xeck+\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 21:13:33 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='rdma.current\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="e64000157720063e"], 0x8}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 21:13:33 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000f40)='cgroup\x00controC\x12\x12\x98\xd1l\x06\x00\x00\x00H=\xc10U\xa0\x8b\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xcf\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6I6#\xa0\xcbB7/\x1e\x14WT\xf8\xcd\x94\xb0N\x89\x85\xb2S\xffE\x14q\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98d\x1e0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000380)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x4, 0x1, 0x0, 0x1, {0xa, 0x4e20, 0x20, @mcast1, 0x8bd}}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000080)="b2f94ccda6bb08b0cd439a50da40a573", 0x10}, {&(0x7f0000000240)="6e0f58576801657dfa0ccf777d5ebd190b070c6f23499a8d7a6297e66ec17b36d0c582142103c621ef29654b5c90c5ca96909f7c9411ba64ed4997672eef5edf9f8c968038c048bb71c8f79818fb50dcda4ddf9455db43968338cd9f5c", 0x5d}, {&(0x7f00000002c0)="79af0dfdba6bc7bd6ab88784b4917ed76672fcf97538bd893a6cf8b534714dbd590097e99947853d3e0b3743d56dab99a86899b967c4e125c44e9ac10d", 0x3d}], 0x3, &(0x7f0000000880)=[{0x50, 0x112, 0x7, "bd8fb1656424e07c75ce04986477d05c043df494fce1e555b7eab73ffb2a3c4c0dde893dce16486737fe6fdf7d5b06cd5c58a552fd39ba97b3"}, {0x90, 0x0, 0x5, "1fe2f79daea5d57be541f2ae2b4bdb618fd82a1365015d5336d14c3b1ec9807c57b3f6a01c36c1bcdc6ecb9267ef87a5360ab09d2a2f3a80c4645a001bd3c522d5e866dae2fe08c3b73546e89b942de704b4b0b1072158066725cebc54bfa96fe1d04d64ccba62edfef81eef7f364d47c229121c2bd277535a51"}, {0xd0, 0x100, 0x800000000, "a7c24ee3e25fc94bff450a528543a11a78197851021360c7940dcb6beb2f3974b54381e46ab27d2b0c8b320e4b5d159091fcbbd32e3109649430d7fe681c54891a072846faf368ef10745d65f8fa4f0ec261c98da3bfbb93b4154c1d8f540eb277c5250a33345be47c5199f3483e90135ae1825162527c64244e6093be3f437bc72ac0fbfa5eb967647f2bfc85a05391d385eb4f997678f8dc8e901d8443874580ad7b5bd7b325ca22f29e83653071fb26ffa3d87f6647116d"}, {0x1010, 0x10e, 0xfe8, "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"}], 0x11c0}, 0x20040080) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000140)=0xfffffffffffffffd) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\xe3\x92a\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\t\x1b&!\x982\xeck+\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 21:13:33 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000f40)='cgroup\x00controC\x12\x12\x98\xd1l\x06\x00\x00\x00H=\xc10U\xa0\x8b\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xcf\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6I6#\xa0\xcbB7/\x1e\x14WT\xf8\xcd\x94\xb0N\x89\x85\xb2S\xffE\x14q\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98d\x1e0x0, r0, 0x0, 0x12, &(0x7f0000000000)='cpuacct.usage_sys\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, r0, 0x0, 0x2, &(0x7f0000000200)='\xa6\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r1, r0, 0x0, 0x19a, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&', r2}, 0x30) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000300)=r0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 21:13:37 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000f40)='cgroup\x00controC\x12\x12\x98\xd1l\x06\x00\x00\x00H=\xc10U\xa0\x8b\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xcf\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6I6#\xa0\xcbB7/\x1e\x14WT\xf8\xcd\x94\xb0N\x89\x85\xb2S\xffE\x14q\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98d\x1e0x0}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)=r4, 0x4) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x40, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000340)={r3, r5}) [ 1033.186903][T15335] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.5'. 21:13:41 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000f40)='cgroup\x00controC\x12\x12\x98\xd1l\x06\x00\x00\x00H=\xc10U\xa0\x8b\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xcf\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6I6#\xa0\xcbB7/\x1e\x14WT\xf8\xcd\x94\xb0N\x89\x85\xb2S\xffE\x14q\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98d\x1e0x0}, 0x80, &(0x7f00000010c0)=[{&(0x7f0000000d00)=""/23, 0x17}, {&(0x7f0000000d40)=""/250, 0xfa}, {&(0x7f0000000e40)=""/92, 0x5c}, {&(0x7f0000000ec0)=""/19, 0x13}, {&(0x7f0000000f00)=""/199, 0xc7}, {&(0x7f0000001000)=""/39, 0x27}, {&(0x7f0000001040)=""/86, 0x56}], 0x7}, 0x12042) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1f, 0x1, &(0x7f00000001c0)=@raw=[@generic={0xfffffffffffff4f9, 0x7, 0x5, 0x1, 0x8}], &(0x7f0000000200)='syzkaller\x00', 0x48, 0x80, &(0x7f00000002c0)=""/128, 0x40f00, 0x1, [], r2, 0x1, r0, 0x8, &(0x7f0000001180)={0x1, 0xfff}, 0x8, 0x10, &(0x7f00000011c0)={0x1fa0, 0x5}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000240)=0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ac6b8910461839188a05b1c81600005cecaa5141b9bbc20f61885be728b0628fabfa036de639a4b9125052d73327e24115c1a063a4cb00164426f4182d2d59fdef36b7c49c19b3f70c35366c21e0c85800000000000000599f1db8b92836d33f5bb0341bd4e5580ccd2b5ca561cc1e3687d8b8de11d930a5e4b8b854eeb406000000000000000090b597317575a6b2f8b14fc81dddbe993c847cc32bbd27ee2dadba7e7882cef28f7d9788f7eae23e8b2cbb20bf"], 0xfdef) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x404000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'bridge_slave_0\x00', 0x1600}) [ 1038.937043][T15618] device nr0 entered promiscuous mode 21:13:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\xe3\x92a\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\t\x1b&!\x982\xeck+\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 21:13:47 executing program 4: r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000f40)='cgroup\x00controC\x12\x12\x98\xd1l\x06\x00\x00\x00H=\xc10U\xa0\x8b\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xcf\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6I6#\xa0\xcbB7/\x1e\x14WT\xf8\xcd\x94\xb0N\x89\x85\xb2S\xffE\x14q\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98d\x1e0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/219, 0xdb}, {&(0x7f0000000440)=""/34, 0x22}, {&(0x7f0000000480)=""/145, 0x91}, {&(0x7f0000000540)=""/223, 0xdf}, {&(0x7f0000000640)=""/42, 0x2a}], 0x6, &(0x7f0000000700)=""/146, 0x92}, 0x2000) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000011c0)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000e40)}, {&(0x7f0000000e80)=""/95, 0x5f}, {&(0x7f0000001000)=""/179, 0xb3}], 0x3, &(0x7f00000010c0)=""/195, 0xc3}, 0x10000) sendmsg$kcm(r0, &(0x7f0000001540)={&(0x7f0000001200)=@xdp={0x2c, 0x5, r1, 0x37}, 0x80, &(0x7f00000012c0)=[{&(0x7f0000001280)="bbcf6295bb9ba4c11764bddeeee469f1d40fb031b6cf886c6637645b9c5d862c909843e049f65ad00c0e37ba6c21def48f61b46e93", 0x35}], 0x1, &(0x7f0000001300)=[{0xf8, 0x10f, 0x1, "11ba8e7f8325996023015bb293a3fc8cd103b236405d7c505efeec22a177544f81a5ce03a0be047e97f5da00de397b844bb407973fffb808c50cc8a2a07fbd90ad59317bf2f1965e517f10cb74c2e92a05b3f020fec6ff297f59827b2bc190a8c8d7956256f12ddc70008b97e00de7f1be4ad38972da21d58ee45c0cf3ee76a3296c6e985a9a4b03d60d82f545d719ed59b37f5624b1696dde0acc5084ffbea81886c9f8c8fdf599524a7a8e6acac96b6f2fdbf1d9f77662182a254cebb1376c35918acd18d4c730450b606ac79a25234ca1ffdb0de10b7287a4e65024e06042322d48df6601"}, {0x60, 0x11f, 0x1, "70b2a331fcf349d44dbbbd6df915d867ad2d5c73d68bbb996bfb8b714aed2048af2d941f99f41bfefc92b9f99720e74c65f33db9d5889f785443b186235af89e70c51ecc1f0842a21c01b9ef93"}, {0xb8, 0x0, 0x6, "8502d6ed8838a76c4a1998ce6f86339cd83e0d58c2df3a0353400fa049a7741147bfa496d8c4b6ad354039e6e21170a7d84d4b0ae75fc7d87e025e87b27eee79b175053e34fc05cfc5927b1e4332822c8ee6c049e7261c3256a08b450d9ca5b564a877d3508eb78b7317b8ebe9805d4c3cb5e77d6a242e8ac77fb64c72d003035ac42200d37a52cd24c3f5e89eb0f744cff2d3cdffeb6505d27575ab6254c82539b6c416"}, {0x10, 0x1ff, 0x1f}], 0x220}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000f40)='cgroup\x00controC\x12\x12\x98\xd1l\x06\x00\x00\x00H=\xc10U\xa0\x8b\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xcf\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6I6#\xa0\xcbB7/\x1e\x14WT\xf8\xcd\x94\xb0N\x89\x85\xb2S\xffE\x14q\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98d\x1e0xffffffffffffffff}) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000100)=0x1a5) close(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000f40)='cgroup\x00controC\x12\x12\x98\xd1l\x06\x00\x00\x00H=\xc10U\xa0\x8b\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xcf\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6I6#\xa0\xcbB7/\x1e\x14WT\xf8\xcd\x94\xb0N\x89\x85\xb2S\xffE\x14q\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98d\x1e0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000340)=r3, 0x4) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000001c0)=r4) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x11}, 0x389) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x111000, 0x0) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f00000000c0)) r6 = openat$cgroup_ro(r0, &(0x7f0000000580)='cgroup\x00controC\x12\x12\x98\xd1l\x06\x00\x00\x00H=\xc10U\xa0\x8b\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xcf\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6I6#\xa0\xcbB7/\x1e\x14WT\xf8\xcd\x94\xb0N\x89\x85\xb2S\xffE\x14q\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98d\x1e0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000000c0)='\x00', 0xffffffffffffffff}, 0x30) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x7ff) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x7fff, 0x101, 0x9, 0x6, 0x0, 0x7f, 0x440, 0x0, 0x10000, 0x0, 0xff, 0x8000, 0x0, 0x40, 0x200, 0x0, 0x9, 0x7fffffff, 0x800, 0x0, 0x20, 0x6, 0xffff, 0x5, 0x1, 0xffffffffffffffff, 0x185c63640000, 0x7, 0x1, 0x2, 0x5, 0x9, 0x4, 0x2, 0x27, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000000), 0xb}, 0x28, 0x2, 0x7, 0x2, 0x0, 0xeae, 0x4}, r0, 0x8, r2, 0x0) 21:13:50 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) [ 1042.367188][T15783] device nr0 entered promiscuous mode [ 1042.568977][T15808] device nr0 entered promiscuous mode 21:13:51 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='/\xc2x\\\xabSCMYg5V\xd8igroup.sta\x9f\xd4t\x00+\x04J\x00\x0f\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eW\x7f\x14\xb2\xa3@\x15\xe2+\xf5\xc6\xde\xc66\x8dF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x0f\x00\x01\xd8?GB\xa4\x04\x17\x91\xe0\xfd<\xdc\x14\x03\xb1Y\xf3\xb9\x14H\xd0\xfb\x88Kru\xfb(\x93\x16\f9\xdb\xfa\xa0\xf0\x1e\xf5#\x0f\xf5\f\x0f\xc0\xff\xe8U\xda\x10\xc3\xd8\'\xf0\xda\xf7\f/q\xfb\xef\x05\xc6\x9e\x03\xd1yG\x1e\x10\xc9\xb3\x81\xccS\x1b\xeb\xf7*\x01\xede\x00\xe8\x8e\xa3Z@\xe3\xf8?\x11\xac\xadb\n?\xf2m\xa3\x9fyD\xbbh\xb2!\x88V\xa0.\xce\xab\xcd\x93\x9c\xd2\xc6E\x89r\r\x98\x96\x99\x01\x16', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="e64000157720063e"], 0x8}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xe1fd000089ffffff, 'c\x86\xdd'}]}, 0xfdef) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x80, 0x0) 21:13:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) openat$cgroup_ro(r0, &(0x7f0000000080)='memory.events\x00', 0x0, 0x0) 21:13:51 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='rdma.current\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="e64000157720063e"], 0x8}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0), 0xfffffe71) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 21:13:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="240000003200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:13:51 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x200000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e4325000000000000000000f9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) 21:13:51 executing program 1: 21:13:51 executing program 4: openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000180)='./cgroup.net/syz0\x00'}, 0x30) r2 = openat$cgroup_ro(r0, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xc4c, 0x7fffffff, 0x7fffffff, 0x7fffffff, 0x0, 0x830, 0x2102, 0x0, 0x0, 0x4, 0x3c, 0x0, 0x9, 0x4, 0x0, 0x6a01, 0x4, 0x0, 0x8000, 0xa1e, 0x81, 0x9c, 0x80, 0x10001, 0x77, 0x10000, 0x330, 0xd9, 0x6, 0x200, 0x7ff, 0x1000, 0x9aa, 0x9, 0x7, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0xffff, 0x8, 0xe, 0x2, 0xffffffffffffff81, 0x18}, r1, 0x0, r2, 0x3) [ 1042.942820][T15824] device nr0 entered promiscuous mode 21:13:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000f40)='cgroup\x00controC\x12\x12\x98\xd1l\x06\x00\x00\x00H=\xc10U\xa0\x8b\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xcf\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6I6#\xa0\xcbB7/\x1e\x14WT\xf8\xcd\x94\xb0N\x89\x85\xb2S\xffE\x14q\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98d\x1e0x0}, 0x80, &(0x7f00000034c0)=[{&(0x7f0000002c80)=""/180, 0xb4}, {&(0x7f0000002d40)=""/251, 0xfb}, {&(0x7f0000002e40)=""/197, 0xc5}, {&(0x7f0000002f40)=""/179, 0xb3}, {&(0x7f0000003000)=""/233, 0xe9}, {&(0x7f0000003100)=""/183, 0xb7}, {&(0x7f00000031c0)=""/218, 0xda}, {&(0x7f00000032c0)=""/217, 0xd9}, {&(0x7f00000033c0)=""/65, 0x41}, {&(0x7f0000003440)=""/82, 0x52}], 0xa, &(0x7f0000003580)=""/82, 0x52}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000003640)={0xf, 0x0, 0x9, 0x100, 0x20, r0, 0x1, [], r3, r1, 0xfffffffffffffffc, 0xdd}, 0x3c) [ 1043.834205][T15868] device nr0 entered promiscuous mode 21:13:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="e03f03003200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:13:52 executing program 1: 21:13:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230100203200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:13:52 executing program 1: 21:13:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="00f0ff7f3200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) [ 1044.265120][T15886] device nr0 entered promiscuous mode [ 1044.283621][T15868] device nr0 entered promiscuous mode [ 1044.595962][T15877] device nr0 entered promiscuous mode 21:13:53 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='/\xc2x\\\xabSCMYg5V\xd8igroup.sta\x9f\xd4t\x00+\x04J\x00\x0f\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eW\x7f\x14\xb2\xa3@\x15\xe2+\xf5\xc6\xde\xc66\x8dF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x0f\x00\x01\xd8?GB\xa4\x04\x17\x91\xe0\xfd<\xdc\x14\x03\xb1Y\xf3\xb9\x14H\xd0\xfb\x88Kru\xfb(\x93\x16\f9\xdb\xfa\xa0\xf0\x1e\xf5#\x0f\xf5\f\x0f\xc0\xff\xe8U\xda\x10\xc3\xd8\'\xf0\xda\xf7\f/q\xfb\xef\x05\xc6\x9e\x03\xd1yG\x1e\x10\xc9\xb3\x81\xccS\x1b\xeb\xf7*\x01\xede\x00\xe8\x8e\xa3Z@\xe3\xf8?\x11\xac\xadb\n?\xf2m\xa3\x9fyD\xbbh\xb2!\x88V\xa0.\xce\xab\xcd\x93\x9c\xd2\xc6E\x89r\r\x98\x96\x99\x01\x16', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="e64000157720063e"], 0x8}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xe1fd0000a0008000, 'c\x86\xdd'}]}, 0xfdef) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x80, 0x0) 21:13:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000f40)='cgroup\x00controC\x12\x12\x98\xd1l\x06\x00\x00\x00H=\xc10U\xa0\x8b\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xcf\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6I6#\xa0\xcbB7/\x1e\x14WT\xf8\xcd\x94\xb0N\x89\x85\xb2S\xffE\x14q\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98d\x1e0xffffffffffffff9c}) sendmsg$kcm(r0, &(0x7f00000007c0)={&(0x7f0000000580)=@rc={0x1f, {0x53, 0x401, 0x4, 0x3, 0x6, 0x9}, 0x2}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000001000)="59aef1a9f35717a3d1df02b39221d218f64bbad5870b3f6440f0cffaf5fa40d1ddc771b33619d7f5caad3828206585b461ee4941c933aa9b2525f3ad5a4ae396f355e0b75e1d906ebd9e680b2773c1218c9db92682f59b675dae9f5a5ae264a0f87317a6f5d3e6123ec93f43176aaa7e4b92880c22745f16aa85334dabbcc92706563c63a6c5858c7a4e5adc88b7f8d337942a02fc6b39a2a8a7bae1058d403c1c729d43d0c990b27ad1863a1213fa702afb1bab4a30cac6c06dcdafcc5fb60bc45ed3970c7d61d55852bdba4551da8f19976a8a2fa3d99f3fb023fc1be4a765062c6f5761c45d35003c8bde6acfe1b7d3b099e366c9c98cb0d2d00ee74edebd133f4a8e81781c6d7dcb3fa418d659000692a2026e08d45e439dea1e2d0db8423e0d568e4f26bf5c049c54dcbc782cb2fa164bc82d22f95a9c5797db59db3689a30d1ce0d401c2278d28b44b8902f796796fe177d2c3b44f1bdb43ce5db6cfaca2b6d21c0be494d1323da4e658d68b70b6fe8d12dfdf95f497fe86edf031c9ee0ccfc2c04076afac569fa52b82a895454d3c523e3bea675712c85074d76f04b72f732689172564ab9c7d34da2f9191c7424946f8c4652f4f72371d816d3998f407b95d0a7c60f1aba985f410082cd3c37803a4e65279816b34f51fb944d351e34e4bf36361c528853f9e910210dda1dc3000dfb643d777f5425b1517dd573e040de68827cc11b64fd98711cf11dc0802fe0e236b381f02e54028438b9ae5a5cd3f11eb34f00762b082ce5227f10a7b1d1f84b406d2e525a231cddaf3916e6050bc11dc01da6ccfae45e0cde3231ccd3cd605f9f2875023504654cb1a46a58650456b18d5ceea66862f1e8fd5ef30cec6f85d8c59274b49d5c202379ae199a8683827b1c42cb6d45fa2cf27a65276e52bdd56108cf3ea11d4d1494c0075653f889b2df3b15ccb5824f57ad477e798919154e89aa87eb28cc1593cd78ebc9331893b5aef3ccbab786e18b27b35eb17b7e48790c67f7edb769c31ddd3a0ccd153da19b4664aabd806fbb98fd2a8703da68878784df0ce9b68d02dfa809790511abe4ece44b080d389f2c6c995272ad7c868002992d35797d776bda637dd2fc8e8cc61d1a62fe999f55b37fee389dd7474be64a99b1ad8c9a7a261a5cb6d0b9870824a8edb15ca2f1b26debcac44c27326340055f542cba4f8808016eeb43102dae07c21937a6ba3bea01c85f8e4f19fa58ce3e76e87dea249aa231a3cbce2a8720dd34eecdb80e7a74d7116def4120d4ba27f84f0dee6261071b73aab808189ff8838f936e58eb5129ffd8695d6026dfcb8f87da4c674101b74003948322eb74533472605a58d1284bffffe2330654804e788c86ccf1b609f106c9fa06b67b506c4b3495006f52e87cd3bd70955496217a0166cf3a134122f18c40a03aa1774f5d6fc9e0164153346054d61d4b02821195c0795c60815b023fc2ae44a0361c3ccd0225d330e33494281fcb2b63f09038b61cf05b7f8a96b05295157b7275d2e58c209580dfddf004ee741f2a7dc4bac75a1832a451fec42245e81f4d38a9c0177341b897dc25481f3d10792e600913a05d9eea08dcc9a6d88fec95f1192c9966ce49ece1b5e8e4053cb7975412dc75ec691918855bec1a589d91b4b097063735e08b45b86ca4bb6d45651841dcf9d4fc5d68e31ebbe35b10658f3c8a0db7b89bd4224105272b1db964a928f0e3862fd7d3d91d47f2df1d6e746c1369804c90db13d0f3a8d9986f0c042e09345f2e24ce0e31ac3d643f00703591688d77ebb88ebb2ce0a1d4f6d8d3725939882eb43a90549bf96478017a2f5a04125f091435aab54b7f7d291b38e1e3cafa519361a19a85360e9ddb2e9aae5745fcf5283115ddda516364f63d1b067bfb823ff276504b7d03b5748dc9848d07ce1c18a382d656bc46fc7dac6f27635ea27171cfe616569785dad5cd4592bf7b1783f7015c87a0666aa94cf77658fc9c0fdace9ef073d55d08e39e9f42736e3b47044e24cc538e110206d9d1fedddcb6895c890cbe389a75e5ea99e516e4337556d3f394fd1782f41f821ac5762f35222deecad917a2115a02992973015fa86ba64ce4cf1e1d50a518c7daf00149924595ca02bab1215b030c2ff1974bf9661787c8c14c77ce2d518dc51a864f902a700dfab5edaebb741e32f72d192608801375edccab0a388dd4d70c43cd5929b61f49e655556d94842341d24c6edf2539f8bdb4f1180eb20dd5b9db1efd3e07177214b68259be528fdf4110ad7847600c82bc9bcce179c5adab36f3dbb5d0fdf4d1edeb672b25a47c2725935d0f07616735fce721a7dc22e368cd591bb8f1e9cadf4632f7e791853dbd66b628d79e26bb81a18b5d4471d5f005e289b37c8f4761e24a718202ef93bd9643b668c8a62123b4d5d69522dcc5bbec2e7db6bf2d362153fe7533fca89d6511ee185ed46c5ebf21c82f07e7628e705b36f45f0267169c5ff2fa5fb1350a7679cd9e13b71a59e723fa566108e1e701e648c48c9642a93edb2fc9a5bb11641b9634ac810de16005b9bc88087da63a9f965f482e5826ef6d393c76c142dad20c66e21f0f22dab7ae1232b37691f648b85516eaabd4cddb3967f1f2142f3cdcb03f81f73f5e0dae4ca8da922e7e024d0dbccff2f5a4511ad255bc44ca711c1a1a3994ab7bdd30004808f43cf47b50c069b79692bc7847f95532204e8a835966a819775b344a53a04100dc3b6b290d7f5f9f10cbbc55f29492a713e17dc394bd5303bb57177d010c5f2ffe631504e9364ff492c152c7f0197fd62657968b49236d31c7044b0c51ecb138d7e586808448f3dfbb3b1fd53d68eabefc96cdf86b47db894ed5839185d541e354312f2c14c31b888097700294e710708083532f417c5cf7c0e2a9a38a861e95bf235e92d294683b185f62072d168233a87751101fb784a23f78cb3fb7df4b13761145ef502b77252ecd1f006c7cfd33ec356e27c3415bc4750881f7ce33f2b130b33e8bed6a3e4e04ac7d8efe382e4a93908fdd29865b40b3ed0c2bacd12e584388efc4b9a9eef135e868c506f62f91ff4992521fe4e3ab99d3019bad81e202e721669945674c61f4865862516b1255c75e85298b9d5ea0afbe3403b5ff275f32d0c2f78932588a07971cf87af5ee3d1b658e3ab9555d7597efd06a39574f7cbd580f72be2c8c3a9ad2cd4cf61cbbf77bdfdd2815c2066a85d412adfbe8fa9c4a49db3fde6b4dce13024212e8e7b79c54e6440ecfc2596f3ee9502633b89bf64715a63fe4fd588b7587a1c6d9abea1d0ae320072047a656537723de55dc485a52a05ec3ae9012cb969e7b3246542f3e1dd5d28ae9d6a534c33274296a5390f79a4d3e400ec537a489019ec4910d1f128ad67e4fe008f062ea95aa6eeef3e1dac29c0e2607c91caa98d245330b1a1a6adf14cbcaa6c600c100450b437cb508524565db88aad849fa8645b7cf76d6f9d3f4fb409375f5a6de5923e456109e03fcf7f5dc8766994a1e93a552951e9854e393fd51df01a37bfd2573645cf8c2fed27a0fe0ef0b131ce418546828539e997fcb47db58d96645f395cf2d10ed372d8822d6f8da9775511726423a05429e800e7dc81d7ffd216f09252a8f532f3817b5ff79fb3d451fb6ec3091b1503fb39ec24deda0ff63522f2f8fb09403a39ae4c1f29163a45024176181734c6137409b44e120a8ca1b7a1961a12a3ff1179837837f4d01e74df55f25dc334519008ac4217aed6c7fcc6bbd088732b5195abf92ce35e96940d4583418c24c9cd78571279a4223bc2ded9c6b5c1354120d12562d807c14f42bf61deb3f8e2f4577b079f8f487a38daed9f69cbf03183d760369982a9733873e0da433ab7ad6a2d29e3ed8a79d77c3060dc1da0e0bafc10f764ce0a86c83c21b88f0a4b1e59e487b431854ee1c0c6200c3febea6c719e005aa359170a121e110b025c83a89ee217e8c0f9ce4e6b7f07467e61600d56a45e00469fdc2ef40bfa6b255bb66a03212fa490d75332b7db4a49292855edc00fbfab78f204c1a4d505f1bff9cb9f24d0d8a106f825091cfb97966668e9d45a421485a21dcd59ecc50772559482c73f33d18e8df249c69c35bc1b997649e1f3c6988d1ac711b37212d517d24f7228039098ec534ccada155e099888aae978ff61af2b3cdcb8a3aa0f75abe005801ea9e86585141943b665e9fee029b52be720248afcb51618341c5f39c64019b25c0a1dcde73128c12f105737736fe171e41253591c68009ab439badcacf2a6c62e050e2cc1980a7cfbd385e68d189b1b4f6e0d1b5205b7a9a53f7850cd90df944ec7ee966ec9419967be1c5571656f4115e6e44421c900c94eab34f670db204b9a637ff6478594d91c0412fc15a2e42e0ea049f0bbd47dfef330c6cbfb7af86ada344295f89410efb93f5a639c551f322892f6deac14df7b5378aaa40eeb77da4ef7fb963e6da304aadbc3c4da884626d56f3465c510085140664f090d17083953fc08c993c607ecef8e81080b39c4476e3243cad29a9f6cf3f150a40bd9fec300adc5752335f02acaae36b02d4d771f92c2a8f9de098c503786845ddd351b13ef1b72b592a9f72ec70be45bff8210a225875cb278e15e0c1fc6a4657cf7b06d96aedfcbb02ee1a4bdeffc99b573a868fc6f25e0522470123d4b1644486ccc94fd43c68923f194ff24dd1966f0365ccfc5d29f4fcc084cea0c9f32fc30b5a027ef80130d270e5379a0cadb95d28e7b00069673765a168f1ba25825ca8b1fee0387f228fd2241235ebeb951d30be76565db79359d3852ac1a01d7516666f8d8c7d10ba9de9fa6e32de6d27ff122704b8531f255fbdddd4ad2f9b5d52eea353fb02af69fd8f69c633b091bb09832356cf6fa63bcb44286cbc891c59372c70405636c3e0be5d1cac0a889ee89e60a74c3d21e42c24a1840034a1790b5a806c2d03e5ec6943786d05253ec6c429ff7547ffc06b5b4ffcf5abaaba0d9e1fb2d4ff539a5b5204805c5ab38227ecf3dee27e1296df85d0b078ce7844ecc65a779baf3c711e4d4aaf46b6827772649f66dfe97b3b521cec33e390ac81c8317e0a60ae8b8d9e39f8780f5c97bfa64d6a56c1127853942d9307527a907b25ba688887954a90514c3350f65928bee273fb2e2273a3e72950e7b02d9eac89e370a1e63ea7bb42cca0fa4677aeb13d91e2dc2cbd53aeeaeb54fcba79f6f31d91bc9f0cc42bbe6e8b0e89d8172b766d70bb2ebd1ce644d5173e75bad739a566ccfe7ac132ba0462b3cf8b44852758508ec2930c8e6372ef6621db7f9b0451320339298d2824f11c919d900b8bc45ad25da548f314ce8a5ae922c59478f2292ba3b764fb6008dd2f90f7e47c6d647aa3921e1ec35f196636be980f2e3a5319e2a7223db16eceae1d6336d8040f8b7b132847d93f5f0da8689badeb3b381bba0adfc84272c891186cf27d6616c3567d1d401df1762b7ad0e4036961768de01e9429fca529d1d7fbd33190d8a5f56cc66f7aff45bfb30e151182af415598077d0d6046b871eaebc3881381e316d97d90fa6b79dfb55c0b94186cb19dcacb364f8b30b1b5d776cfc296ec2c376d9fb1810fbb5b09c7e4843c17c5c2743b4118d59befcd53e0bc0d2eb407a70099cd1d25810bda2f29378907cc060da3106f46d775c59528f28a0ae08399f41bc5eddde2ce6a024b5081e0880041f14b6de028e3e62fb093ec570fd139b4d6b22f6abcb2cae6ad4a98523f68735b5c3c1ce919fd870cd94a9f13b5503a1", 0x1000}, {&(0x7f0000000600)="bca34dbb8cb3592d50dabf0824987d86c04343ce41e82d8355c52f394d1df1658406d5a80def9b7b7bab86183b8327a6bc27e008aab5fc0c6657f052c3607e9cdd1317236711dcb8797e46edb690241516", 0x51}, {&(0x7f0000000680)="335d576d16eff7f335edd5e981c2a7eff71ffad885b662715950fb", 0x1b}], 0x3, &(0x7f0000000700)=[{0x88, 0x11f, 0xffffffffffffffe1, "2f5f5d89b1876f9ef1366c48f2399e8303cb6ba23d3815d3f148d6409236a9479c7b80fdafb76545fe44814ef573e3879a718f1bdb06dc0f2dbd46cf0441abf20846968a1b1e64638f5cbe886be95cce0eb847af91f1f8c405f131edbd95289568664915e6db0d29be4f8683a91996900137fc9516e7"}], 0x88}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000f40)='cgroup\x00controC\x12\x12\x98\xd1l\x06\x00\x00\x00H=\xc10U\xa0\x8b\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xcf\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6I6#\xa0\xcbB7/\x1e\x14WT\xf8\xcd\x94\xb0N\x89\x85\xb2S\xffE\x14q\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98d\x1e0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/198, 0xc6}], 0x1, &(0x7f0000002000)=""/4096, 0x1000}, 0x10000) mkdirat$cgroup(r0, &(0x7f0000000180)='syz1\x00', 0x1ff) sendmsg$kcm(r0, &(0x7f0000000d40)={&(0x7f0000000a40)=@can={0x1d, r1}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000ac0)="996f99d31f1410b1fc8ad8a226a1c1fa2d0983e08ebd229ea99dd4bb6bd0baf8f4311797744f86976e6f2152dd478ea1e67319624b09b2e3bba9aae59a580735f82819cb45fad0b5b25aaae13ddbb519a036cc21742c65c603a644006cfa0b40aa48a537d6194ec51a03e5b0c0ef168ab9712b9b744c39be086e99af3d09a0d2f7a90ed77294fbc99aacbc3b29c37c8be6cf161b3b9de7f9eb6e63bbff658c0917f44111f8119909c5b9050a1704ee7a8b0d978f777a415a0bcc33966721fda997c538c70dbd1ced1df8a4adfad2d584962eda84be2fa06fc9821f474fe55b049ec1", 0xe2}, {&(0x7f0000000bc0)="714ea474c2b51e94d238691b4ce97cb027f5bfc87c0baf9cea28b3bf9ae09881f054c871f4038f31ba306281", 0x2c}], 0x2, &(0x7f0000000c40)=[{0xf0, 0x19d, 0x5, "f170029816879d1c100d56d6ca123d88326506454d1b4a4f7820c923a1575a0303fab790d03b8d76bf0efb43622d42ddf079a20bdf472d1fb566066f8dea1832b7fbdedf90c5c416616eac24811a8644215efc89970a1e3c3de23c8610d1ca2cca645c8d836bb49ffa92688efd95d737e890b5c66aefad827672c2e713d8a53a86e9c0776126bb14c7758b8774039ed54b7502d9ec06e2ee9394a39fdea6e29d6eea2b14b8a7aad001b0b8cb4d86fd9116d3aff5a9566786871587efae0e6b7f0d83a5276f4bda2120322f7ab1e63eb83cf7c236f08159dc7adb6c729e851d1e"}], 0xf0}, 0x20000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000f40)='cgroup\x00controC\x12\x12\x98\xd1l\x06\x00\x00\x00H=\xc10U\xa0\x8b\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xcf\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6I6#\xa0\xcbB7/\x1e\x14WT\xf8\xcd\x94\xb0N\x89\x85\xb2S\xffE\x14q\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98d\x1e0x0}, 0x80, &(0x7f00000055c0)=[{&(0x7f0000005300)=""/254, 0xfe}, {&(0x7f0000000540)=""/174, 0xfffffffffffffda2}, {&(0x7f00000054c0)=""/117, 0xffffffffffffff09}, {&(0x7f0000005540)=""/80, 0x50}], 0x4, &(0x7f0000005600)=""/175, 0xaf}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000005700)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000057c0)={0xb, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, [@generic={0x2, 0x3, 0x8dda, 0xfffffffffffffff8, 0x20}]}, &(0x7f00000000c0)='GPL\x00', 0x80000000, 0x8d, &(0x7f0000000100)=""/141, 0x41000, 0x1, [], r0, 0xf, r1, 0x8, &(0x7f0000005740)={0x3, 0xff}, 0x8, 0x10, &(0x7f0000005780)={0xc51, 0x2, 0x7, 0x1}, 0x10}, 0x70) r2 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f00000002c0)='cgroup\x00controC\x12\x12\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xcf\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\xac\xa3\xc5\xad\xdd\xdd\xd1\xc6\x15\xfd\x05\x8aT\bi\x1f\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6IWTq\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98\x81\x1e0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={r3, 0x10, &(0x7f00000004c0)={&(0x7f00000001c0)=""/89, 0x59, r4}}, 0x10) 21:14:01 executing program 4: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)=0x8000, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000500)='io.stae!Ka\xa2R\xa2\x12\b\rw 9\xcb\x00\f\x03S', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000400)='keyringGPL\x00') r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000003c0)='cpuset.effective_cpus\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000380)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x802fffff) r6 = getpid() sendmsg$kcm(r1, &(0x7f0000000280)={&(0x7f0000000540)=@in6={0xa, 0x4e24, 0x2, @dev={0xfe, 0x80, [], 0x20}, 0xdcff}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)="fd48783839aef42ad5be0c1905324e7afa075e54582d907576cadf16f26f514d68f4788b2c80b189d341e14c28d34b315b7fe13e3343a13569b87ed9a53077521b671801", 0x44}], 0x1}, 0x4011) ioctl$TUNSETVNETHDRSZ(r5, 0x400454d8, &(0x7f0000000440)=0x2) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000140)={'veth1_to_hsr\x00', 0x400}) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x95, 0x0, 0x81, 0x10000, 0x0, 0x1a2, 0x84, 0x5b861fbf8959867a, 0x4f50, 0x81, 0x2, 0x4, 0x9, 0x7fff, 0x1ff, 0x8, 0x1f, 0x100000001, 0x2bd, 0xfffffffffffff001, 0x7, 0xffff, 0x0, 0x401, 0x1, 0x4, 0x9, 0x0, 0x3, 0x9, 0xfffffffffffffffe, 0x1, 0x1, 0x9, 0x3, 0x4, 0x0, 0x101, 0x0, @perf_bp={&(0x7f00000004c0), 0x4}, 0x800, 0x3, 0x7, 0x9, 0xfffffffffffffff7, 0x9, 0x221f2153}, r6, 0xc, 0xffffffffffffff9c, 0xb) getpid() perf_event_open(0x0, 0x0, 0xfffffffffeffffff, r2, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000005c0)={r1, r5, 0xf, 0x6}, 0x10) ioctl$TUNGETFEATURES(r7, 0x800454cf, &(0x7f0000000700)) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee405dc09000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x400000, 0x0) openat$cgroup_ro(r2, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) [ 1052.809326][T16309] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 21:14:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="236c00003200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) [ 1052.949506][T16310] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1052.984831][T16267] device nr0 entered promiscuous mode [ 1053.205998][T16310] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1053.231201][T16309] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 21:14:01 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='/\xc2x\\\xabSCMYg5V\xd8igroup.sta\x9f\xd4t\x00+\x04J\x00\x0f\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eW\x7f\x14\xb2\xa3@\x15\xe2+\xf5\xc6\xde\xc66\x8dF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x0f\x00\x01\xd8?GB\xa4\x04\x17\x91\xe0\xfd<\xdc\x14\x03\xb1Y\xf3\xb9\x14H\xd0\xfb\x88Kru\xfb(\x93\x16\f9\xdb\xfa\xa0\xf0\x1e\xf5#\x0f\xf5\f\x0f\xc0\xff\xe8U\xda\x10\xc3\xd8\'\xf0\xda\xf7\f/q\xfb\xef\x05\xc6\x9e\x03\xd1yG\x1e\x10\xc9\xb3\x81\xccS\x1b\xeb\xf7*\x01\xede\x00\xe8\x8e\xa3Z@\xe3\xf8?\x11\xac\xadb\n?\xf2m\xa3\x9fyD\xbbh\xb2!\x88V\xa0.\xce\xab\xcd\x93\x9c\xd2\xc6E\x89r\r\x98\x96\x99\x01\x16', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="e64000157720063e"], 0x8}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xe1fd0000ffffff89, 'c\x86\xdd'}]}, 0xfdef) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x80, 0x0) 21:14:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="23f000003200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:01 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x200000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e4325000000000000000000f9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) 21:14:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="130000003200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='rdma.current\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="e64000157720063e"], 0x8}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000003c0)=""/195, 0xc3}, {&(0x7f00000006c0)=""/232, 0xe8}, {&(0x7f00000001c0)=""/65, 0x41}, {&(0x7f0000000000)=""/4, 0x4}, {&(0x7f00000007c0)=""/239, 0xef}, {&(0x7f00000008c0)=""/206, 0xce}, {&(0x7f00000009c0)=""/242, 0xf2}, {&(0x7f0000000240)=""/9, 0x9}], 0x8, &(0x7f0000000ac0)=""/4096, 0x1000}, 0x12000) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 21:14:01 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000f40)='cpuset.memory_pressure\x00', 0x0, 0x0) 21:14:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230003003200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000f40)='cgroup\x00controC\x12\x12\x98\xd1l\x06\x00\x00\x00H=\xc10U\xa0\x8b\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xcf\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6I6#\xa0\xcbB7/\x1e\x14WT\xf8\xcd\x94\xb0N\x89\x85\xb2S\xffE\x14q\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98d\x1e0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r1, 0x4) [ 1053.432083][T16327] device nr0 entered promiscuous mode [ 1053.440525][T16335] device nr0 entered promiscuous mode 21:14:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230005003200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:02 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000000140)=']^\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000200)={0x1, 0x70, 0x9, 0xffff, 0x1a, 0x2, 0x0, 0x7955, 0x8a000, 0x4, 0x5, 0x100000001, 0xffffffff, 0x1000, 0x7, 0x5, 0x10001, 0x7fff, 0x101, 0x40, 0x4, 0x9deb, 0x9, 0x2, 0x2e4b, 0x7, 0x4, 0x3, 0x7fff, 0x7, 0xa8d, 0xd21f, 0x3, 0xfffffffffffff786, 0x7, 0x8, 0x100000001, 0x207, 0x0, 0xf79, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}, 0x4902, 0xff, 0x3, 0x5, 0x7, 0x5, 0xf5}) openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup\x00controC\x12\x12=\xc10U\xa0\x8b\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xba\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6I6#\xa0\xcbB7/\x1e\x14WT\xf8\xcd\x94\xb0N\x89\x85\xb2S\xffE\x14q\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98d\x1ei\xae\xa7\t\n\xfa\xdf$\xfaAL\xf3\xaa\xbe\xe4\xff\r\xab6\x9d\x91\xfe\bs Ew\xd0\xae\xeaV\r\xaeHJ\xb4\xe1\x97\xd1\xfb\x1a\x9f\xae\xebhm<{\":ilw{\xa8\xe5\x1be1\xfd\xa9\xf7o\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) 21:14:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000f40)='cgroup\x00controC\x12\x12\x98\xd1l\x06\x00\x00\x00H=\xc10U\xa0\x8b\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xcf\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6I6#\xa0\xcbB7/\x1e\x14WT\xf8\xcd\x94\xb0N\x89\x85\xb2S\xffE\x14q\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98d\x1e0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r1, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 21:14:03 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)=0x8000, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000500)='io.stae!Ka\xa2R\xa2\x12\b\rw 9\xcb\x00\f\x03S', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000400)='keyringGPL\x00') r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac00"/46, 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000003c0)='cpuset.effective_cpus\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000380)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x802fffff) r6 = getpid() sendmsg$kcm(r1, &(0x7f0000000280)={&(0x7f0000000540)=@in6={0xa, 0x4e24, 0x2, @dev={0xfe, 0x80, [], 0x20}, 0xdcff}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)="fd48783839aef42ad5be0c1905324e7afa075e54582d907576cadf16f26f514d68f4788b2c80b189d341e14c28d34b315b7fe13e3343a13569b87ed9a53077521b671801", 0x44}], 0x1}, 0x4011) ioctl$TUNSETVNETHDRSZ(r5, 0x400454d8, &(0x7f0000000440)=0x2) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000140)={'veth1_to_hsr\x00', 0x400}) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x95, 0x0, 0x81, 0x10000, 0x0, 0x1a2, 0x84, 0x5b861fbf8959867a, 0x4f50, 0x81, 0x2, 0x4, 0x9, 0x7fff, 0x1ff, 0x8, 0x1f, 0x100000001, 0x2bd, 0xfffffffffffff001, 0x7, 0xffff, 0x0, 0x401, 0x1, 0x4, 0x9, 0x0, 0x3, 0x9, 0xfffffffffffffffe, 0x1, 0x1, 0x9, 0x3, 0x4, 0x0, 0x101, 0x0, @perf_bp={&(0x7f00000004c0), 0x4}, 0x800, 0x3, 0x7, 0x9, 0xfffffffffffffff7, 0x9, 0x221f2153}, r6, 0xc, 0xffffffffffffff9c, 0xb) getpid() perf_event_open(0x0, 0x0, 0xfffffffffeffffff, r2, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.events\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000005c0)={r1, r5, 0xf, 0x6}, 0x10) ioctl$TUNGETFEATURES(r7, 0x800454cf, &(0x7f0000000700)) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee405dc09000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x400000, 0x0) openat$cgroup_ro(r2, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) 21:14:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000f40)='cgroup\x00controC\x12\x12\x98\xd1l\x06\x00\x00\x00H=\xc10U\xa0\x8b\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xcf\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6I6#\xa0\xcbB7/\x1e\x14WT\xf8\xcd\x94\xb0N\x89\x85\xb2S\xffE\x14q\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98d\x1e0xffffffffffffffff}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={r1}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000f40)='cgroup\x00controC\x12\x12\x98\xd1l\x06\x00\x00\x00H=\xc10U\xa0\x8b\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xcf\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6I6#\xa0\xcbB7/\x1e\x14WT\xf8\xcd\x94\xb0N\x89\x85\xb2S\xffE\x14q\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98d\x1e0xffffffffffffffff}) sendmsg$kcm(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000340)="971019ced04d55deee96184e34e864dd0f5677ae202a4ff8fe0d0d4290fcd9d1c6a44c9a20778e84c13565f16e5996c32266ea100f7583409db190a69a834f6775e2eddcea7ecea668a7f3158e300e7cce9aa4c79ed394a5bbc26ce1e1d2fbe14a50832d4dea9ccbddff511e779cd40fdcc0f7bc", 0x74}], 0x1}, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={0x0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f00000004c0)=0x6) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, 0x0, 0x26) 21:14:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230060003200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="235865003200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000f40)='cgroup\x00controC\x12\x12\x98\xd1l\x06\x00\x00\x00H=\xc10U\xa0\x8b\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xcf\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6I6#\xa0\xcbB7/\x1e\x14WT\xf8\xcd\x94\xb0N\x89\x85\xb2S\xffE\x14q\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98d\x1e0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r0, 0x10, &(0x7f0000000340)={&(0x7f0000000180)=""/52, 0x34, r1}}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x101000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r0, 0x0, 0x7, &(0x7f0000000100)='.\\bdev\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x8, 0xfffffffffffffff7, 0x2, 0x9a36, 0x0, 0x0, 0x8, 0x8, 0x0, 0x10000, 0x9, 0x4, 0xf1, 0x0, 0x9, 0x341, 0xe372, 0x1ff, 0x8001, 0x2, 0x2, 0x1, 0x0, 0x100, 0x8, 0x0, 0x7fffffff, 0x7f, 0x800, 0x4, 0x20, 0x40, 0x6, 0x5, 0x80000001, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xd}, 0x80, 0x3f, 0x2, 0xe, 0x8, 0xfff, 0x6}, r2, 0xc, r0, 0x2) 21:14:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230002003200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:09 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x200000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e4325000000000000000000f9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) 21:14:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230060003200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='rdma.current\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x7e) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x336, &(0x7f00000007c0)=ANY=[@ANYRESHEX=r0, @ANYRESDEC=r1, @ANYBLOB="adafd792f1fb07505099a7aff1c61c4b84845fbfdc7ad03171caeb4cc6c751a3d4712153682bc241a3748d91c984338b6360cd745a27343065ed417e434f39b7ddbe29e82a4ecce88094b305e63d39f5812b3b5f6867f8bcb2717745bc103ef09cd46cd938b1e009870c7f5d38eb15a68f9a1f8324d9ff07a927082c803d32aea11da8a2ffc5c873d923dfda808873852ad20aec57b40f27ac9ba349cf737d81deb15fec953a53427133c52081", @ANYRES16=0x0, @ANYPTR=&(0x7f0000000740)=ANY=[@ANYPTR=&(0x7f00000006c0)=ANY=[@ANYRESDEC=0x0, @ANYRESHEX, @ANYRES64=r0], @ANYRESOCT=r0, @ANYRESDEC=0x0, @ANYRES16=r0, @ANYRESOCT=r0, @ANYPTR64=&(0x7f0000000700)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYRESHEX=r1]]]}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x2b2, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x9, 0x2}, 0x0, 0x0, &(0x7f0000000240)={0x8, 0xa0c, 0x81, 0xffff}, &(0x7f00000002c0)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x1}}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)={[{0x2d, 'rdma'}, {0x2f, 'rdma'}, {0x2b, 'io'}, {0x2f, 'rdma'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'io'}]}, 0x26) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f00000000001eb8073f12c6280a"], 0x5) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0xb5) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 21:14:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='cgroup\x00controC\x12\x12\x98\xd1l\x06\x00\x00\x00H=\xc10U\xa0\x8b\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xcf\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6I6#\xa0\xcbB7/\x1e\x14WT\xf8\xcd\x94\xb0N\x89\x85\xb2S\xffE\x14q\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98d\x1e0x0}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001ac0)=""/66, 0x42}, {&(0x7f0000001b40)=""/160, 0xa0}, {&(0x7f0000001c00)=""/187, 0xbb}], 0x3, &(0x7f0000002500)=""/4096, 0x1000}, 0x2) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000001d40)=r3) [ 1065.401595][T16925] netlink: 'syz-executor.4': attribute type 6 has an invalid length. 21:14:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2300f0003200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) [ 1065.445518][T16923] device nr0 entered promiscuous mode [ 1065.475967][T16928] device nr0 entered promiscuous mode 21:14:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000033200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:14 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='/\xc2x\\\xabSCMYg5V\xd8igroup.sta\x9f\xd4t\x00+\x04J\x00\x0f\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eW\x7f\x14\xb2\xa3@\x15\xe2+\xf5\xc6\xde\xc66\x8dF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x0f\x00\x01\xd8?GB\xa4\x04\x17\x91\xe0\xfd<\xdc\x14\x03\xb1Y\xf3\xb9\x14H\xd0\xfb\x88Kru\xfb(\x93\x16\f9\xdb\xfa\xa0\xf0\x1e\xf5#\x0f\xf5\f\x0f\xc0\xff\xe8U\xda\x10\xc3\xd8\'\xf0\xda\xf7\f/q\xfb\xef\x05\xc6\x9e\x03\xd1yG\x1e\x10\xc9\xb3\x81\xccS\x1b\xeb\xf7*\x01\xede\x00\xe8\x8e\xa3Z@\xe3\xf8?\x11\xac\xadb\n?\xf2m\xa3\x9fyD\xbbh\xb2!\x88V\xa0.\xce\xab\xcd\x93\x9c\xd2\xc6E\x89r\r\x98\x96\x99\x01\x16', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="e64000157720063e"], 0x8}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xe1fd000000000000, 'c\x86\xdd'}]}, 0x86) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 21:14:14 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x200000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e4325000000000000000000f9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) 21:14:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000053200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000063200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000073200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2300000a3200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) [ 1066.213051][T16928] device nr0 entered promiscuous mode 21:14:14 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='/\xc2x\\\xabSCMYg5V\xd8igroup.sta\x9f\xd4t\x00+\x04J\x00\x0f\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eW\x7f\x14\xb2\xa3@\x15\xe2+\xf5\xc6\xde\xc66\x8dF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x0f\x00\x01\xd8?GB\xa4\x04\x17\x91\xe0\xfd<\xdc\x14\x03\xb1Y\xf3\xb9\x14H\xd0\xfb\x88Kru\xfb(\x93\x16\f9\xdb\xfa\xa0\xf0\x1e\xf5#\x0f\xf5\f\x0f\xc0\xff\xe8U\xda\x10\xc3\xd8\'\xf0\xda\xf7\f/q\xfb\xef\x05\xc6\x9e\x03\xd1yG\x1e\x10\xc9\xb3\x81\xccS\x1b\xeb\xf7*\x01\xede\x00\xe8\x8e\xa3Z@\xe3\xf8?\x11\xac\xadb\n?\xf2m\xa3\x9fyD\xbbh\xb2!\x88V\xa0.\xce\xab\xcd\x93\x9c\xd2\xc6E\x89r\r\x98\x96\x99\x01\x16', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="e64000157720063e"], 0x8}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xe1fd000000000000, 'c\x86\xdd'}]}, 0xfdef) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x80, 0x0) 21:14:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2300000c3200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:14 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='/\xc2x\\\xabSCMYg5V\xd8igroup.sta\x9f\xd4t\x00+\x04J\x00\x0f\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eW\x7f\x14\xb2\xa3@\x15\xe2+\xf5\xc6\xde\xc66\x8dF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x0f\x00\x01\xd8?GB\xa4\x04\x17\x91\xe0\xfd<\xdc\x14\x03\xb1Y\xf3\xb9\x14H\xd0\xfb\x88Kru\xfb(\x93\x16\f9\xdb\xfa\xa0\xf0\x1e\xf5#\x0f\xf5\f\x0f\xc0\xff\xe8U\xda\x10\xc3\xd8\'\xf0\xda\xf7\f/q\xfb\xef\x05\xc6\x9e\x03\xd1yG\x1e\x10\xc9\xb3\x81\xccS\x1b\xeb\xf7*\x01\xede\x00\xe8\x8e\xa3Z@\xe3\xf8?\x11\xac\xadb\n?\xf2m\xa3\x9fyD\xbbh\xb2!\x88V\xa0.\xce\xab\xcd\x93\x9c\xd2\xc6E\x89r\r\x98\x96\x99\x01\x16', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="e64000157720063e"], 0x8}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xe1fd000000000000, 'c\x86\xdd'}]}, 0x86) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 21:14:14 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='rdma.current\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="e64000157720063e"], 0x8}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 21:14:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000063200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:14 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x200000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e4325000000000000000000f9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) [ 1066.534153][T16984] device nr0 entered promiscuous mode 21:14:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2300180c3200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="23007a003200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2300000e3200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:15 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000f40)='cgroup\x00controC\x12\x12\x98\xd1l\x06\x00\x00\'H=\xc10U\xa0\x8b\x15\xb4\x8a\x7f{CgLN\x109\x13\xc3\xd6\xcf\xa5\xf5K\x04\xb2\xf3\x997 \xff\x05\x81\x19&Y[\x8f]\x9c\xfa\x84e\\\xd4\xe9L\x04@4\x84\xd8\xf8\xde\x9f\xbd\xc8;\x94\xad\xd2\x8c\v\xc6I6#\xa0\xcbB7/\x1e\x14WT\xf8\xcd\x94\xb0N\x89\x85\xb2S\xffE\x14q\xc2\x1c\xf4\rp;}\xdd\x86\x04u\xa1R\xae+\x8d\x81\x98d\x1e0x0}, 0x80, &(0x7f0000004680)=[{&(0x7f0000002480)=""/1, 0x1}], 0x1}, 0x12100) bpf$PROG_LOAD(0x5, &(0x7f0000004780)={0xf, 0x5, &(0x7f00000001c0)=@raw=[@map={0x18, 0x5, 0x1, 0x0, r2}, @call={0x85, 0x0, 0x0, 0x20}, @map={0x18, 0xf, 0x1, 0x0, r2}], &(0x7f0000000200)='GPL\x00', 0x3d, 0x48, &(0x7f00000002c0)=""/72, 0x41f00, 0x1, [], r3, 0x7, r0, 0x8, &(0x7f0000004700)={0x5, 0xff}, 0x8, 0x10, &(0x7f0000004740)={0x125, 0x800, 0x800, 0x5}, 0x10}, 0x70) 21:14:16 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='/\xc2x\\\xabSCMYg5V\xd8igroup.sta\x9f\xd4t\x00+\x04J\x00\x0f\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eW\x7f\x14\xb2\xa3@\x15\xe2+\xf5\xc6\xde\xc66\x8dF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x0f\x00\x01\xd8?GB\xa4\x04\x17\x91\xe0\xfd<\xdc\x14\x03\xb1Y\xf3\xb9\x14H\xd0\xfb\x88Kru\xfb(\x93\x16\f9\xdb\xfa\xa0\xf0\x1e\xf5#\x0f\xf5\f\x0f\xc0\xff\xe8U\xda\x10\xc3\xd8\'\xf0\xda\xf7\f/q\xfb\xef\x05\xc6\x9e\x03\xd1yG\x1e\x10\xc9\xb3\x81\xccS\x1b\xeb\xf7*\x01\xede\x00\xe8\x8e\xa3Z@\xe3\xf8?\x11\xac\xadb\n?\xf2m\xa3\x9fyD\xbbh\xb2!\x88V\xa0.\xce\xab\xcd\x93\x9c\xd2\xc6E\x89r\r\x98\x96\x99\x01\x16', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="e64000157720063e"], 0x8}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xe1fd000000003b00, 'c\x86\xdd'}]}, 0xfdef) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x80, 0x0) 21:14:16 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x200000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e4325000000000000000000f9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) 21:14:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000203200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) [ 1067.799162][T17037] device nr0 entered promiscuous mode [ 1067.845507][T17043] device nr0 entered promiscuous mode 21:14:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2300003f3200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:16 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x200000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e4325000000000000000000f9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) 21:14:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000403200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000483200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2300004c3200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) [ 1068.408723][T17043] device nr0 entered promiscuous mode 21:14:17 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='/\xc2x\\\xabSCMYg5V\xd8igroup.sta\x9f\xd4t\x00+\x04J\x00\x0f\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eW\x7f\x14\xb2\xa3@\x15\xe2+\xf5\xc6\xde\xc66\x8dF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x0f\x00\x01\xd8?GB\xa4\x04\x17\x91\xe0\xfd<\xdc\x14\x03\xb1Y\xf3\xb9\x14H\xd0\xfb\x88Kru\xfb(\x93\x16\f9\xdb\xfa\xa0\xf0\x1e\xf5#\x0f\xf5\f\x0f\xc0\xff\xe8U\xda\x10\xc3\xd8\'\xf0\xda\xf7\f/q\xfb\xef\x05\xc6\x9e\x03\xd1yG\x1e\x10\xc9\xb3\x81\xccS\x1b\xeb\xf7*\x01\xede\x00\xe8\x8e\xa3Z@\xe3\xf8?\x11\xac\xadb\n?\xf2m\xa3\x9fyD\xbbh\xb2!\x88V\xa0.\xce\xab\xcd\x93\x9c\xd2\xc6E\x89r\r\x98\x96\x99\x01\x16', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="e64000157720063e"], 0x8}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xe1fd000000000000, 'c\x86\xdd'}]}, 0x86) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x80, 0x0) 21:14:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='rdma.current\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="e64000157720063e"], 0x8}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, r3, 0x0, 0x1, &(0x7f0000000300)='\x00', 0xffffffffffffffff}, 0x30) write$cgroup_pid(r0, &(0x7f00000003c0)=r5, 0x12) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) r6 = gettid() write$cgroup_pid(r3, &(0x7f0000000240)=r6, 0x12) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000001c0)={'bond0\x00', 0xe110}) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 21:14:17 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='rdma.current\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="e64000157720063e"], 0x8}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x200000000000000, 'c\x86\xdd'}]}, 0xfdef) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 21:14:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='/\xc2x\\\xabSCMYg5V\xd8igroup.sta\x9f\xd4t\x00+\x04J\x00\x0f\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eW\x7f\x14\xb2\xa3@\x15\xe2+\xf5\xc6\xde\xc66\x8dF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x0f\x00\x01\xd8?GB\xa4\x04\x17\x91\xe0\xfd<\xdc\x14\x03\xb1Y\xf3\xb9\x14H\xd0\xfb\x88Kru\xfb(\x93\x16\f9\xdb\xfa\xa0\xf0\x1e\xf5#\x0f\xf5\f\x0f\xc0\xff\xe8U\xda\x10\xc3\xd8\'\xf0\xda\xf7\f/q\xfb\xef\x05\xc6\x9e\x03\xd1yG\x1e\x10\xc9\xb3\x81\xccS\x1b\xeb\xf7*\x01\xede\x00\xe8\x8e\xa3Z@\xe3\xf8?\x11\xac\xadb\n?\xf2m\xa3\x9fyD\xbbh\xb2!\x88V\xa0.\xce\xab\xcd\x93\x9c\xd2\xc6E\x89r\r\x98\x96\x99\x01\x16', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="197adff53c6b3ea7"], 0x8}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000240)) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0xe1fd000000000000, 'c\x86\xdd'}]}, 0xfdef) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000280)={'veth1_to_hsr\x00', @random="ccef7f3c8c52"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='&\x00', r0}, 0x10) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x80, 0x0) 21:14:17 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x200000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e4325000000000000000000f9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) 21:14:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230065583200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000603200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) [ 1068.789097][T17087] device nr0 entered promiscuous mode [ 1068.810262][T17096] device nr0 entered promiscuous mode 21:14:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230058653200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000683200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2300006c3200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000743200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2300007a3200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) [ 1069.465748][T17096] device nr0 entered promiscuous mode 21:14:18 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='/\xc2x\\\xabSCMYg5V\xd8igroup.sta\x9f\xd4t\x00+\x04J\x00\x0f\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eW\x7f\x14\xb2\xa3@\x15\xe2+\xf5\xc6\xde\xc66\x8dF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x0f\x00\x01\xd8?GB\xa4\x04\x17\x91\xe0\xfd<\xdc\x14\x03\xb1Y\xf3\xb9\x14H\xd0\xfb\x88Kru\xfb(\x93\x16\f9\xdb\xfa\xa0\xf0\x1e\xf5#\x0f\xf5\f\x0f\xc0\xff\xe8U\xda\x10\xc3\xd8\'\xf0\xda\xf7\f/q\xfb\xef\x05\xc6\x9e\x03\xd1yG\x1e\x10\xc9\xb3\x81\xccS\x1b\xeb\xf7*\x01\xede\x00\xe8\x8e\xa3Z@\xe3\xf8?\x11\xac\xadb\n?\xf2m\xa3\x9fyD\xbbh\xb2!\x88V\xa0.\xce\xab\xcd\x93\x9c\xd2\xc6E\x89r\r\x98\x96\x99\x01\x16', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="e64000157720063e"], 0x8}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xe1fd000000000000, 'c\x86\xdd'}]}, 0x86) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x80, 0x0) 21:14:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='rdma.current\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="e64000157720063e"], 0x8}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000000)) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000001c0)={'netdevsim0\x00'}) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200)={0x0, r0, 0xd, 0x1}, 0x14) 21:14:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000813200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:18 executing program 4 (fault-call:1 fault-nth:0): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) [ 1069.813522][T17138] FAULT_INJECTION: forcing a failure. [ 1069.813522][T17138] name failslab, interval 1, probability 0, space 0, times 0 [ 1069.826266][T17138] CPU: 0 PID: 17138 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #34 [ 1069.834272][T17138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1069.844336][T17138] Call Trace: [ 1069.847637][T17138] dump_stack+0x172/0x1f0 [ 1069.851981][T17138] should_fail.cold+0xa/0x15 [ 1069.856590][T17138] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1069.862398][T17138] ? ___might_sleep+0x163/0x280 [ 1069.867236][T17138] __should_failslab+0x121/0x190 [ 1069.872176][T17138] should_failslab+0x9/0x14 [ 1069.876685][T17138] kmem_cache_alloc_node_trace+0x270/0x720 [ 1069.882509][T17138] __kmalloc_node+0x3d/0x70 [ 1069.887199][T17138] kvmalloc_node+0xbd/0x100 [ 1069.891704][T17138] alloc_netdev_mqs+0x98/0xd30 [ 1069.896465][T17138] ? tun_show_owner+0x170/0x170 [ 1069.901314][T17138] __tun_chr_ioctl+0x178d/0x3ee0 [ 1069.906250][T17138] ? tomoyo_init_request_info+0x105/0x1d0 [ 1069.911976][T17138] ? tun_select_queue+0x7d0/0x7d0 [ 1069.917007][T17138] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1069.923010][T17138] ? __fget+0x35a/0x550 [ 1069.927167][T17138] ? tun_chr_compat_ioctl+0x30/0x30 [ 1069.932364][T17138] tun_chr_ioctl+0x2b/0x40 [ 1069.936779][T17138] do_vfs_ioctl+0xd6e/0x1390 [ 1069.941368][T17138] ? ioctl_preallocate+0x210/0x210 [ 1069.946476][T17138] ? __fget+0x381/0x550 [ 1069.950639][T17138] ? ksys_dup3+0x3e0/0x3e0 [ 1069.955056][T17138] ? tomoyo_file_ioctl+0x23/0x30 [ 1069.959987][T17138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1069.966344][T17138] ? security_file_ioctl+0x93/0xc0 [ 1069.971473][T17138] ksys_ioctl+0xab/0xd0 [ 1069.975630][T17138] __x64_sys_ioctl+0x73/0xb0 [ 1069.980222][T17138] do_syscall_64+0x103/0x610 [ 1069.984831][T17138] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1069.990723][T17138] RIP: 0033:0x458c29 [ 1069.994622][T17138] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1070.014235][T17138] RSP: 002b:00007f09b122dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1070.022681][T17138] RAX: ffffffffffffffda RBX: 00007f09b122dc90 RCX: 0000000000458c29 [ 1070.030646][T17138] RDX: 0000000020000300 RSI: 00000000400454ca RDI: 0000000000000003 [ 1070.038647][T17138] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1070.046628][T17138] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f09b122e6d4 [ 1070.054595][T17138] R13: 00000000004c328b R14: 00000000004d66e0 R15: 0000000000000004 [ 1070.066197][T17144] device nr0 entered promiscuous mode 21:14:18 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x200000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e4325000000000000000000f9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) 21:14:18 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='/\xc2x\\\xabSCMYg5V\xd8igroup.sta\x9f\xd4t\x00+\x04J\x00\x0f\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eW\x7f\x14\xb2\xa3@\x15\xe2+\xf5\xc6\xde\xc66\x8dF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x0f\x00\x01\xd8?GB\xa4\x04\x17\x91\xe0\xfd<\xdc\x14\x03\xb1Y\xf3\xb9\x14H\xd0\xfb\x88Kru\xfb(\x93\x16\f9\xdb\xfa\xa0\xf0\x1e\xf5#\x0f\xf5\f\x0f\xc0\xff\xe8U\xda\x10\xc3\xd8\'\xf0\xda\xf7\f/q\xfb\xef\x05\xc6\x9e\x03\xd1yG\x1e\x10\xc9\xb3\x81\xccS\x1b\xeb\xf7*\x01\xede\x00\xe8\x8e\xa3Z@\xe3\xf8?\x11\xac\xadb\n?\xf2m\xa3\x9fyD\xbbh\xb2!\x88V\xa0.\xce\xab\xcd\x93\x9c\xd2\xc6E\x89r\r\x98\x96\x99\x01\x16', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="e64000157720063e"], 0x8}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xe1fd000000000000, 'c\x86\xdd'}]}, 0xfdef) socket$kcm(0x29, 0x7, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x80, 0x0) 21:14:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000f03200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:18 executing program 4 (fault-call:1 fault-nth:1): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) 21:14:18 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='/\xc2x\\\xabSCMYg5V\xd8igroup.sta\x9f\xd4t\x00+\x04J\x00\x0f\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eW\x7f\x14\xb2\xa3@\x15\xe2+\xf5\xc6\xde\xc66\x8dF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x0f\x00\x01\xd8?GB\xa4\x04\x17\x91\xe0\xfd<\xdc\x14\x03\xb1Y\xf3\xb9\x14H\xd0\xfb\x88Kru\xfb(\x93\x16\f9\xdb\xfa\xa0\xf0\x1e\xf5#\x0f\xf5\f\x0f\xc0\xff\xe8U\xda\x10\xc3\xd8\'\xf0\xda\xf7\f/q\xfb\xef\x05\xc6\x9e\x03\xd1yG\x1e\x10\xc9\xb3\x81\xccS\x1b\xeb\xf7*\x01\xede\x00\xe8\x8e\xa3Z@\xe3\xf8?\x11\xac\xadb\n?\xf2m\xa3\x9fyD\xbbh\xb2!\x88V\xa0.\xce\xab\xcd\x93\x9c\xd2\xc6E\x89r\r\x98\x96\x99\x01\x16', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="e64000157720063e"], 0x8}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xe1fd000000000000, 'c\x86\xdd'}]}, 0x86) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x80, 0x0) [ 1070.261776][T17137] device nr0 entered promiscuous mode 21:14:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000000a00817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000000f00817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000003000817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) [ 1070.677952][T17165] FAULT_INJECTION: forcing a failure. [ 1070.677952][T17165] name failslab, interval 1, probability 0, space 0, times 0 [ 1070.695086][T17165] CPU: 1 PID: 17165 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #34 [ 1070.703081][T17165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1070.713135][T17165] Call Trace: [ 1070.716505][T17165] dump_stack+0x172/0x1f0 [ 1070.720842][T17165] should_fail.cold+0xa/0x15 [ 1070.725427][T17165] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1070.731225][T17165] __should_failslab+0x121/0x190 [ 1070.736157][T17165] should_failslab+0x9/0x14 [ 1070.740680][T17165] kmem_cache_alloc_trace+0x4b/0x760 [ 1070.745975][T17165] __hw_addr_create_ex+0x5e/0x310 [ 1070.750998][T17165] __hw_addr_add_ex+0x1ef/0x2b0 [ 1070.755850][T17165] dev_addr_init+0x118/0x200 [ 1070.760429][T17165] ? dev_mc_flush+0x40/0x40 [ 1070.764918][T17165] ? __kmalloc_node+0x4e/0x70 [ 1070.769580][T17165] alloc_netdev_mqs+0x142/0xd30 [ 1070.774418][T17165] ? tun_show_owner+0x170/0x170 [ 1070.779270][T17165] __tun_chr_ioctl+0x178d/0x3ee0 [ 1070.784192][T17165] ? tomoyo_init_request_info+0x105/0x1d0 [ 1070.789917][T17165] ? tun_select_queue+0x7d0/0x7d0 [ 1070.794955][T17165] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1070.800785][T17165] ? __fget+0x35a/0x550 [ 1070.804949][T17165] ? tun_chr_compat_ioctl+0x30/0x30 [ 1070.810148][T17165] tun_chr_ioctl+0x2b/0x40 [ 1070.814577][T17165] do_vfs_ioctl+0xd6e/0x1390 [ 1070.819180][T17165] ? ioctl_preallocate+0x210/0x210 [ 1070.824438][T17165] ? __fget+0x381/0x550 [ 1070.828581][T17165] ? ksys_dup3+0x3e0/0x3e0 [ 1070.833004][T17165] ? tomoyo_file_ioctl+0x23/0x30 [ 1070.837937][T17165] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1070.844172][T17165] ? security_file_ioctl+0x93/0xc0 [ 1070.849295][T17165] ksys_ioctl+0xab/0xd0 [ 1070.853456][T17165] __x64_sys_ioctl+0x73/0xb0 [ 1070.858072][T17165] do_syscall_64+0x103/0x610 [ 1070.862685][T17165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1070.868576][T17165] RIP: 0033:0x458c29 [ 1070.872461][T17165] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1070.892086][T17165] RSP: 002b:00007f09b122dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1070.900586][T17165] RAX: ffffffffffffffda RBX: 00007f09b122dc90 RCX: 0000000000458c29 [ 1070.908656][T17165] RDX: 0000000020000300 RSI: 00000000400454ca RDI: 0000000000000003 [ 1070.916636][T17165] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 21:14:19 executing program 4 (fault-call:1 fault-nth:2): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) [ 1070.924605][T17165] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f09b122e6d4 [ 1070.932670][T17165] R13: 00000000004c328b R14: 00000000004d66e0 R15: 0000000000000004 [ 1070.952009][T17171] device nr0 entered promiscuous mode 21:14:19 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='rdma.current\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="e64000157720063e"], 0x8}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000200)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000000)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000f80)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\x00\xf9\xf1\xc6\x13-\xb6\x88Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x8e\x14B\xd8\xd0\r\xcbW\xf0\x13\xff\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q[-\x14w/\r\x18u!p\x17y\x8e\"\xd3\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x00\x00\x00\x00') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f00000001c0)) [ 1071.121575][T17187] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1071.142639][T17193] FAULT_INJECTION: forcing a failure. [ 1071.142639][T17193] name failslab, interval 1, probability 0, space 0, times 0 [ 1071.170908][T17193] CPU: 1 PID: 17193 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #34 [ 1071.178972][T17193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1071.189217][T17193] Call Trace: [ 1071.189253][T17193] dump_stack+0x172/0x1f0 [ 1071.189279][T17193] should_fail.cold+0xa/0x15 [ 1071.189301][T17193] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1071.189325][T17193] ? ___might_sleep+0x163/0x280 [ 1071.189359][T17193] __should_failslab+0x121/0x190 [ 1071.196985][T17193] should_failslab+0x9/0x14 21:14:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000003100817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) [ 1071.197005][T17193] kmem_cache_alloc_node_trace+0x270/0x720 [ 1071.197026][T17193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1071.197046][T17193] ? dev_addr_init+0x17f/0x200 [ 1071.197073][T17193] __kmalloc_node+0x3d/0x70 [ 1071.243797][T17193] kvmalloc_node+0x68/0x100 [ 1071.248324][T17193] alloc_netdev_mqs+0x67f/0xd30 [ 1071.253221][T17193] ? tun_show_owner+0x170/0x170 [ 1071.258152][T17193] __tun_chr_ioctl+0x178d/0x3ee0 [ 1071.267877][T17193] ? tomoyo_init_request_info+0x105/0x1d0 [ 1071.273726][T17193] ? tun_select_queue+0x7d0/0x7d0 [ 1071.278781][T17193] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1071.284641][T17193] ? __fget+0x35a/0x550 [ 1071.288836][T17193] ? tun_chr_compat_ioctl+0x30/0x30 [ 1071.294084][T17193] tun_chr_ioctl+0x2b/0x40 [ 1071.298536][T17193] do_vfs_ioctl+0xd6e/0x1390 [ 1071.303134][T17193] ? ioctl_preallocate+0x210/0x210 [ 1071.308265][T17193] ? __fget+0x381/0x550 [ 1071.312449][T17193] ? ksys_dup3+0x3e0/0x3e0 [ 1071.316873][T17193] ? tomoyo_file_ioctl+0x23/0x30 [ 1071.321831][T17193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1071.328116][T17193] ? security_file_ioctl+0x93/0xc0 [ 1071.333250][T17193] ksys_ioctl+0xab/0xd0 [ 1071.337416][T17193] __x64_sys_ioctl+0x73/0xb0 [ 1071.342057][T17193] do_syscall_64+0x103/0x610 [ 1071.346673][T17193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1071.352693][T17193] RIP: 0033:0x458c29 [ 1071.356581][T17193] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1071.376186][T17193] RSP: 002b:00007f09b122dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1071.384602][T17193] RAX: ffffffffffffffda RBX: 00007f09b122dc90 RCX: 0000000000458c29 [ 1071.393141][T17193] RDX: 0000000020000300 RSI: 00000000400454ca RDI: 0000000000000003 [ 1071.402282][T17193] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1071.410273][T17193] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f09b122e6d4 [ 1071.418265][T17193] R13: 00000000004c328b R14: 00000000004d66e0 R15: 0000000000000004 21:14:19 executing program 4 (fault-call:1 fault-nth:3): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) [ 1071.452226][T17201] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.5'. 21:14:19 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x200000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e4325000000000000000000f9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) [ 1071.584956][T17213] FAULT_INJECTION: forcing a failure. [ 1071.584956][T17213] name failslab, interval 1, probability 0, space 0, times 0 [ 1071.609037][T17213] CPU: 0 PID: 17213 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #34 [ 1071.617074][T17213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1071.627155][T17213] Call Trace: [ 1071.630481][T17213] dump_stack+0x172/0x1f0 [ 1071.634848][T17213] should_fail.cold+0xa/0x15 [ 1071.639469][T17213] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1071.645300][T17213] ? ___might_sleep+0x163/0x280 [ 1071.650176][T17213] __should_failslab+0x121/0x190 [ 1071.655136][T17213] should_failslab+0x9/0x14 [ 1071.659666][T17213] kmem_cache_alloc_node_trace+0x270/0x720 [ 1071.665521][T17213] ? kasan_unpoison_shadow+0x35/0x50 [ 1071.670928][T17213] __kmalloc_node+0x3d/0x70 [ 1071.675459][T17213] kvmalloc_node+0x68/0x100 [ 1071.679981][T17213] alloc_netdev_mqs+0x821/0xd30 [ 1071.684866][T17213] __tun_chr_ioctl+0x178d/0x3ee0 [ 1071.689824][T17213] ? tomoyo_init_request_info+0x105/0x1d0 [ 1071.695594][T17213] ? tun_select_queue+0x7d0/0x7d0 [ 1071.700643][T17213] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1071.706507][T17213] ? __fget+0x35a/0x550 [ 1071.710699][T17213] ? tun_chr_compat_ioctl+0x30/0x30 [ 1071.715939][T17213] tun_chr_ioctl+0x2b/0x40 [ 1071.720390][T17213] do_vfs_ioctl+0xd6e/0x1390 [ 1071.725022][T17213] ? ioctl_preallocate+0x210/0x210 [ 1071.730159][T17213] ? __fget+0x381/0x550 [ 1071.734357][T17213] ? ksys_dup3+0x3e0/0x3e0 [ 1071.738805][T17213] ? tomoyo_file_ioctl+0x23/0x30 [ 1071.743770][T17213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1071.750036][T17213] ? security_file_ioctl+0x93/0xc0 [ 1071.755179][T17213] ksys_ioctl+0xab/0xd0 [ 1071.759362][T17213] __x64_sys_ioctl+0x73/0xb0 [ 1071.763979][T17213] do_syscall_64+0x103/0x610 [ 1071.768592][T17213] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1071.774496][T17213] RIP: 0033:0x458c29 [ 1071.778399][T17213] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1071.798021][T17213] RSP: 002b:00007f09b122dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1071.806458][T17213] RAX: ffffffffffffffda RBX: 00007f09b122dc90 RCX: 0000000000458c29 [ 1071.814469][T17213] RDX: 0000000020000300 RSI: 00000000400454ca RDI: 0000000000000003 [ 1071.822474][T17213] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 21:14:20 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='/\xc2x\\\xabSCMYg5V\xd8igroup.sta\x9f\xd4t\x00+\x04J\x00\x0f\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eW\x7f\x14\xb2\xa3@\x15\xe2+\xf5\xc6\xde\xc66\x8dF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x0f\x00\x01\xd8?GB\xa4\x04\x17\x91\xe0\xfd<\xdc\x14\x03\xb1Y\xf3\xb9\x14H\xd0\xfb\x88Kru\xfb(\x93\x16\f9\xdb\xfa\xa0\xf0\x1e\xf5#\x0f\xf5\f\x0f\xc0\xff\xe8U\xda\x10\xc3\xd8\'\xf0\xda\xf7\f/q\xfb\xef\x05\xc6\x9e\x03\xd1yG\x1e\x10\xc9\xb3\x81\xccS\x1b\xeb\xf7*\x01\xede\x00\xe8\x8e\xa3Z@\xe3\xf8?\x11\xac\xadb\n?\xf2m\xa3\x9fyD\xbbh\xb2!\x88V\xa0.\xce\xab\xcd\x93\x9c\xd2\xc6E\x89r\r\x98\x96\x99\x01\x16', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="e64000157720063e"], 0x8}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'tunl0\x00', 0x200}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0xe1fd000000000000, 'c\x86\xdd'}]}, 0xfdef) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x80, 0x0) 21:14:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000023200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:20 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='/\xc2x\\\xabSCMYg5V\xd8igroup.sta\x9f\xd4t\x00+\x04J\x00\x0f\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eW\x7f\x14\xb2\xa3@\x15\xe2+\xf5\xc6\xde\xc66\x8dF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x0f\x00\x01\xd8?GB\xa4\x04\x17\x91\xe0\xfd<\xdc\x14\x03\xb1Y\xf3\xb9\x14H\xd0\xfb\x88Kru\xfb(\x93\x16\f9\xdb\xfa\xa0\xf0\x1e\xf5#\x0f\xf5\f\x0f\xc0\xff\xe8U\xda\x10\xc3\xd8\'\xf0\xda\xf7\f/q\xfb\xef\x05\xc6\x9e\x03\xd1yG\x1e\x10\xc9\xb3\x81\xccS\x1b\xeb\xf7*\x01\xede\x00\xe8\x8e\xa3Z@\xe3\xf8?\x11\xac\xadb\n?\xf2m\xa3\x9fyD\xbbh\xb2!\x88V\xa0.\xce\xab\xcd\x93\x9c\xd2\xc6E\x89r\r\x98\x96\x99\x01\x16', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="e64000157720063e"], 0x8}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xe1fd000000000000, 'c\x86\xdd'}]}, 0x86) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x80, 0x0) [ 1071.830462][T17213] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f09b122e6d4 [ 1071.838455][T17213] R13: 00000000004c328b R14: 00000000004d66e0 R15: 0000000000000004 21:14:20 executing program 4 (fault-call:1 fault-nth:4): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) 21:14:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='rdma.current\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="d9b60bd2872fbb48"], 0x8}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x4005}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xec\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 1072.032367][T17222] device nr0 entered promiscuous mode [ 1072.052380][T17230] FAULT_INJECTION: forcing a failure. [ 1072.052380][T17230] name failslab, interval 1, probability 0, space 0, times 0 [ 1072.067100][T17230] CPU: 0 PID: 17230 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #34 21:14:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000033200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:20 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x200000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e4325000000000000000000f9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) [ 1072.075118][T17230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1072.085208][T17230] Call Trace: [ 1072.088539][T17230] dump_stack+0x172/0x1f0 [ 1072.092909][T17230] should_fail.cold+0xa/0x15 [ 1072.097541][T17230] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1072.103380][T17230] ? ___might_sleep+0x163/0x280 [ 1072.108278][T17230] __should_failslab+0x121/0x190 [ 1072.113238][T17230] should_failslab+0x9/0x14 [ 1072.117768][T17230] kmem_cache_alloc_node_trace+0x270/0x720 [ 1072.123600][T17230] ? mark_held_locks+0xa4/0xf0 [ 1072.128398][T17230] __kmalloc_node+0x3d/0x70 [ 1072.132927][T17230] kvmalloc_node+0x68/0x100 [ 1072.137448][T17230] tun_attach+0x754/0x1440 [ 1072.141889][T17230] ? mod_timer+0x576/0x1030 [ 1072.141923][T17230] __tun_chr_ioctl+0x2180/0x3ee0 [ 1072.141939][T17230] ? tomoyo_init_request_info+0x105/0x1d0 [ 1072.141960][T17230] ? tun_select_queue+0x7d0/0x7d0 [ 1072.141972][T17230] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1072.141999][T17230] ? __fget+0x35a/0x550 [ 1072.142020][T17230] ? tun_chr_compat_ioctl+0x30/0x30 [ 1072.177360][T17230] tun_chr_ioctl+0x2b/0x40 [ 1072.181799][T17230] do_vfs_ioctl+0xd6e/0x1390 [ 1072.186419][T17230] ? ioctl_preallocate+0x210/0x210 [ 1072.191540][T17230] ? __fget+0x381/0x550 [ 1072.195721][T17230] ? ksys_dup3+0x3e0/0x3e0 [ 1072.200169][T17230] ? tomoyo_file_ioctl+0x23/0x30 [ 1072.205211][T17230] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1072.211467][T17230] ? security_file_ioctl+0x93/0xc0 [ 1072.216602][T17230] ksys_ioctl+0xab/0xd0 [ 1072.220778][T17230] __x64_sys_ioctl+0x73/0xb0 [ 1072.225387][T17230] do_syscall_64+0x103/0x610 [ 1072.229997][T17230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1072.235908][T17230] RIP: 0033:0x458c29 [ 1072.239808][T17230] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1072.259433][T17230] RSP: 002b:00007f09b122dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1072.267873][T17230] RAX: ffffffffffffffda RBX: 00007f09b122dc90 RCX: 0000000000458c29 [ 1072.275872][T17230] RDX: 0000000020000300 RSI: 00000000400454ca RDI: 0000000000000003 [ 1072.283855][T17230] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1072.291842][T17230] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f09b122e6d4 [ 1072.299829][T17230] R13: 00000000004c328b R14: 00000000004d66e0 R15: 0000000000000004 21:14:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000043200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000053200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:21 executing program 4 (fault-call:1 fault-nth:5): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) [ 1072.571435][T17240] device nr0 entered promiscuous mode 21:14:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000063200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) 21:14:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x100000000000001, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000073200817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000009c0)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)) socket$kcm(0x29, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x3, 0x1c000000000000, 0x0, 0x0, 0x9, 0x8, 0xe, 0x0, 0x7f, 0x401, 0x6, 0x5, 0x8, 0x3bfc, 0xfff, 0x22, 0xfff, 0x4, 0x9, 0xffffffff, 0x0, 0x81, 0x1, 0x900, 0xb94, 0x6, 0x9, 0xfffffffffffffffd, 0x5, 0x80000000, 0x910, 0x6, 0x8, 0x1000, 0x7, 0x0, 0x1, 0x2, @perf_config_ext={0xa76f, 0x6}, 0xa084, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x1000, 0xfff}, r2, 0x3, 0xffffffffffffff9c, 0x1) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000006c0)=""/79, 0x4f}], 0x9, &(0x7f0000000800)=""/214, 0xd6}, 0x2100) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x1e1) [ 1072.985842][T17262] FAULT_INJECTION: forcing a failure. [ 1072.985842][T17262] name failslab, interval 1, probability 0, space 0, times 0 [ 1072.999013][T17262] CPU: 1 PID: 17262 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #34 [ 1073.007007][T17262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1073.017087][T17262] Call Trace: [ 1073.020373][T17262] dump_stack+0x172/0x1f0 [ 1073.024704][T17262] should_fail.cold+0xa/0x15 [ 1073.029317][T17262] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1073.035127][T17262] ? ___might_sleep+0x163/0x280 [ 1073.039995][T17262] __should_failslab+0x121/0x190 [ 1073.044917][T17262] should_failslab+0x9/0x14 [ 1073.049511][T17262] __kmalloc_track_caller+0x2d8/0x740 [ 1073.054934][T17262] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1073.060226][T17262] ? trace_hardirqs_on+0x67/0x230 [ 1073.065276][T17262] ? kasan_check_read+0x11/0x20 [ 1073.070143][T17262] ? kstrdup_const+0x66/0x80 [ 1073.074750][T17262] kstrdup+0x3a/0x70 [ 1073.078673][T17262] kstrdup_const+0x66/0x80 [ 1073.083106][T17262] kvasprintf_const+0x10e/0x190 [ 1073.087968][T17262] kobject_set_name_vargs+0x5b/0x150 [ 1073.093256][T17262] dev_set_name+0xbd/0xf0 [ 1073.097573][T17262] ? device_initialize+0x440/0x440 [ 1073.102684][T17262] ? __init_waitqueue_head+0x36/0x90 [ 1073.107976][T17262] ? pm_runtime_init+0x311/0x3b0 [ 1073.112925][T17262] netdev_register_kobject+0xc3/0x3c0 [ 1073.118301][T17262] register_netdevice+0x878/0xff0 [ 1073.123331][T17262] ? netdev_change_features+0xb0/0xb0 [ 1073.128729][T17262] __tun_chr_ioctl+0x21c9/0x3ee0 [ 1073.133650][T17262] ? tomoyo_init_request_info+0x105/0x1d0 [ 1073.139392][T17262] ? tun_select_queue+0x7d0/0x7d0 [ 1073.144429][T17262] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1073.150240][T17262] ? __fget+0x35a/0x550 [ 1073.154384][T17262] ? tun_chr_compat_ioctl+0x30/0x30 [ 1073.159563][T17262] tun_chr_ioctl+0x2b/0x40 [ 1073.163976][T17262] do_vfs_ioctl+0xd6e/0x1390 [ 1073.168557][T17262] ? ioctl_preallocate+0x210/0x210 [ 1073.173668][T17262] ? __fget+0x381/0x550 [ 1073.177809][T17262] ? ksys_dup3+0x3e0/0x3e0 [ 1073.182214][T17262] ? tomoyo_file_ioctl+0x23/0x30 [ 1073.187171][T17262] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1073.193397][T17262] ? security_file_ioctl+0x93/0xc0 [ 1073.198578][T17262] ksys_ioctl+0xab/0xd0 [ 1073.202720][T17262] __x64_sys_ioctl+0x73/0xb0 [ 1073.207323][T17262] do_syscall_64+0x103/0x610 [ 1073.212093][T17262] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1073.217973][T17262] RIP: 0033:0x458c29 [ 1073.221866][T17262] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1073.242130][T17262] RSP: 002b:00007f09b122dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1073.250542][T17262] RAX: ffffffffffffffda RBX: 00007f09b122dc90 RCX: 0000000000458c29 [ 1073.258511][T17262] RDX: 0000000020000300 RSI: 00000000400454ca RDI: 0000000000000003 [ 1073.266492][T17262] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1073.274448][T17262] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f09b122e6d4 [ 1073.282402][T17262] R13: 00000000004c328b R14: 00000000004d66e0 R15: 0000000000000004 [ 1073.292938][T17262] ------------[ cut here ]------------ [ 1073.298400][T17262] kernel BUG at net/core/net-sysfs.c:1631! [ 1073.304318][T17262] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1073.310384][T17262] CPU: 1 PID: 17262 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #34 [ 1073.318334][T17262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1073.328384][T17262] RIP: 0010:netdev_release+0x92/0xb0 [ 1073.333649][T17262] Code: 48 c1 ea 03 80 3c 02 00 75 29 48 8b bb 80 fa ff ff e8 72 7a 21 fc 4c 89 ef e8 2a c3 f5 ff 5b 41 5c 41 5d 5d c3 e8 4e ad e9 fb <0f> 0b e8 97 b4 21 fc eb 9c e8 f0 b4 21 fc eb d0 0f 1f 40 00 66 2e [ 1073.353241][T17262] RSP: 0018:ffff88805fa8f9e8 EFLAGS: 00010246 [ 1073.359381][T17262] RAX: 0000000000040000 RBX: ffff88806c803560 RCX: ffffc90007e0b000 [ 1073.367589][T17262] RDX: 0000000000040000 RSI: ffffffff8586e1b2 RDI: 0000000000000001 [ 1073.375571][T17262] RBP: ffff88805fa8fa00 R08: ffff8880a09403c0 R09: ffff8880a0940c60 [ 1073.383529][T17262] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1073.391484][T17262] R13: ffff88806c802fc0 R14: 0000000000000000 R15: 0000000000000000 [ 1073.399438][T17262] FS: 00007f09b122e700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1073.408347][T17262] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1073.419699][T17262] CR2: 00007fea51231000 CR3: 00000000a8a2b000 CR4: 00000000001406e0 [ 1073.427923][T17262] DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1073.435874][T17262] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1073.443824][T17262] Call Trace: [ 1073.447105][T17262] ? xps_cpus_store+0x2b0/0x2b0 [ 1073.451975][T17262] device_release+0x7d/0x210 [ 1073.456562][T17262] kobject_put.cold+0x28f/0x2ec [ 1073.461409][T17262] put_device+0x20/0x30 [ 1073.465567][T17262] netdev_register_kobject+0x1a1/0x3c0 [ 1073.471019][T17262] register_netdevice+0x878/0xff0 [ 1073.476031][T17262] ? netdev_change_features+0xb0/0xb0 [ 1073.481387][T17262] __tun_chr_ioctl+0x21c9/0x3ee0 [ 1073.486315][T17262] ? tomoyo_init_request_info+0x105/0x1d0 [ 1073.492032][T17262] ? tun_select_queue+0x7d0/0x7d0 [ 1073.497055][T17262] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1073.502846][T17262] ? __fget+0x35a/0x550 [ 1073.506985][T17262] ? tun_chr_compat_ioctl+0x30/0x30 [ 1073.512162][T17262] tun_chr_ioctl+0x2b/0x40 [ 1073.516586][T17262] do_vfs_ioctl+0xd6e/0x1390 [ 1073.521158][T17262] ? ioctl_preallocate+0x210/0x210 [ 1073.526251][T17262] ? __fget+0x381/0x550 [ 1073.530419][T17262] ? ksys_dup3+0x3e0/0x3e0 [ 1073.534838][T17262] ? tomoyo_file_ioctl+0x23/0x30 [ 1073.539759][T17262] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1073.545983][T17262] ? security_file_ioctl+0x93/0xc0 [ 1073.551098][T17262] ksys_ioctl+0xab/0xd0 [ 1073.555247][T17262] __x64_sys_ioctl+0x73/0xb0 [ 1073.559821][T17262] do_syscall_64+0x103/0x610 [ 1073.564400][T17262] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1073.570283][T17262] RIP: 0033:0x458c29 [ 1073.574186][T17262] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1073.593774][T17262] RSP: 002b:00007f09b122dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1073.602170][T17262] RAX: ffffffffffffffda RBX: 00007f09b122dc90 RCX: 0000000000458c29 [ 1073.610128][T17262] RDX: 0000000020000300 RSI: 00000000400454ca RDI: 0000000000000003 [ 1073.618107][T17262] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1073.626068][T17262] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f09b122e6d4 [ 1073.634019][T17262] R13: 00000000004c328b R14: 00000000004d66e0 R15: 0000000000000004 [ 1073.642204][T17262] Modules linked in: [ 1073.646861][T17262] ---[ end trace 3500fcb4a50c09b6 ]--- [ 1073.652375][T17262] RIP: 0010:netdev_release+0x92/0xb0 [ 1073.657654][T17262] Code: 48 c1 ea 03 80 3c 02 00 75 29 48 8b bb 80 fa ff ff e8 72 7a 21 fc 4c 89 ef e8 2a c3 f5 ff 5b 41 5c 41 5d 5d c3 e8 4e ad e9 fb <0f> 0b e8 97 b4 21 fc eb 9c e8 f0 b4 21 fc eb d0 0f 1f 40 00 66 2e [ 1073.677351][T17262] RSP: 0018:ffff88805fa8f9e8 EFLAGS: 00010246 [ 1073.683473][T17262] RAX: 0000000000040000 RBX: ffff88806c803560 RCX: ffffc90007e0b000 [ 1073.691514][T17262] RDX: 0000000000040000 RSI: ffffffff8586e1b2 RDI: 0000000000000001 [ 1073.699505][T17262] RBP: ffff88805fa8fa00 R08: ffff8880a09403c0 R09: ffff8880a0940c60 [ 1073.707508][T17262] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1073.715535][T17262] R13: ffff88806c802fc0 R14: 0000000000000000 R15: 0000000000000000 [ 1073.723557][T17262] FS: 00007f09b122e700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1073.732526][T17262] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1073.739240][T17262] CR2: 00007fea51231000 CR3: 00000000a8a2b000 CR4: 00000000001406e0 [ 1073.747244][T17262] DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1073.755285][T17262] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1073.763287][T17262] Kernel panic - not syncing: Fatal exception [ 1073.770131][T17262] Kernel Offset: disabled [ 1073.774450][T17262] Rebooting in 86400 seconds..