00ffffffff 19:55:20 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 478.063150][T19400] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 478.071270][T19400] CPU: 1 PID: 19400 Comm: syz-executor.2 Not tainted 5.4.0-rc1+ #0 [ 478.079169][T19400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.089239][T19400] Call Trace: [ 478.092548][T19400] dump_stack+0x172/0x1f0 [ 478.096897][T19400] sysfs_warn_dup.cold+0x1c/0x31 [ 478.101862][T19400] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 478.107937][T19400] sysfs_create_link+0x65/0xc0 19:55:20 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, 0x0, 0x0) [ 478.112693][T19400] device_add+0x75c/0x17a0 [ 478.112708][T19400] ? mark_lock+0xc2/0x1220 [ 478.112725][T19400] ? uevent_show+0x370/0x370 [ 478.112740][T19400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.112764][T19400] wiphy_register+0x1c46/0x2720 [ 478.112789][T19400] ? wiphy_unregister+0x1040/0x1040 [ 478.112809][T19400] ? __kmalloc+0x608/0x770 [ 478.112827][T19400] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 478.112840][T19400] ? lockdep_hardirqs_on+0x421/0x5e0 [ 478.112854][T19400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.112866][T19400] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 478.112883][T19400] ieee80211_register_hw+0x157e/0x3ac0 [ 478.112906][T19400] ? ieee80211_ifa_changed+0xde0/0xde0 [ 478.112921][T19400] ? memset+0x32/0x40 [ 478.112940][T19400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.191089][T19400] ? __hrtimer_init+0x13d/0x280 [ 478.195965][T19400] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 478.201676][T19400] ? __kasan_check_read+0x11/0x20 [ 478.206696][T19400] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 478.213111][T19400] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 478.218989][T19400] hwsim_new_radio_nl+0x9e3/0x1070 [ 478.224089][T19400] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 478.229963][T19400] ? nla_memcpy+0xb0/0xb0 [ 478.234284][T19400] ? __nla_parse+0x43/0x60 [ 478.238699][T19400] genl_family_rcv_msg+0x74b/0xf90 [ 478.243799][T19400] ? genl_unregister_family+0x7b0/0x7b0 [ 478.249332][T19400] ? __kasan_check_read+0x11/0x20 [ 478.254343][T19400] ? __lock_acquire+0x16f2/0x4a00 [ 478.259358][T19400] ? __dev_queue_xmit+0xbb5/0x3720 [ 478.264465][T19400] genl_rcv_msg+0xca/0x170 [ 478.268868][T19400] netlink_rcv_skb+0x177/0x450 [ 478.273707][T19400] ? genl_family_rcv_msg+0xf90/0xf90 [ 478.278984][T19400] ? netlink_ack+0xb50/0xb50 [ 478.283555][T19400] ? __kasan_check_write+0x14/0x20 [ 478.288652][T19400] ? netlink_deliver_tap+0x254/0xbf0 [ 478.293923][T19400] genl_rcv+0x29/0x40 [ 478.297886][T19400] netlink_unicast+0x531/0x710 [ 478.302639][T19400] ? netlink_attachskb+0x7c0/0x7c0 [ 478.307731][T19400] ? _copy_from_iter_full+0x25d/0x8c0 [ 478.313088][T19400] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 478.318806][T19400] ? __check_object_size+0x3d/0x437 [ 478.324012][T19400] netlink_sendmsg+0x8a5/0xd60 [ 478.328816][T19400] ? netlink_unicast+0x710/0x710 [ 478.333752][T19400] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 478.339282][T19400] ? apparmor_socket_sendmsg+0x2a/0x30 [ 478.344738][T19400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.350960][T19400] ? security_socket_sendmsg+0x8d/0xc0 [ 478.356420][T19400] ? netlink_unicast+0x710/0x710 [ 478.361340][T19400] sock_sendmsg+0xd7/0x130 [ 478.365740][T19400] ___sys_sendmsg+0x803/0x920 [ 478.370401][T19400] ? copy_msghdr_from_user+0x440/0x440 [ 478.375852][T19400] ? __kasan_check_read+0x11/0x20 [ 478.380861][T19400] ? __fget+0x384/0x560 [ 478.385003][T19400] ? ksys_dup3+0x3e0/0x3e0 [ 478.389406][T19400] ? __fget_light+0x1a9/0x230 [ 478.394075][T19400] ? __fdget+0x1b/0x20 [ 478.398134][T19400] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 478.404360][T19400] __sys_sendmsg+0x105/0x1d0 [ 478.408932][T19400] ? __sys_sendmsg_sock+0xd0/0xd0 [ 478.413946][T19400] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 478.419387][T19400] ? do_syscall_64+0x26/0x760 [ 478.424047][T19400] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.430094][T19400] ? do_syscall_64+0x26/0x760 [ 478.434759][T19400] __x64_sys_sendmsg+0x78/0xb0 [ 478.439506][T19400] do_syscall_64+0xfa/0x760 [ 478.444002][T19400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.449884][T19400] RIP: 0033:0x459a59 [ 478.453764][T19400] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 478.473348][T19400] RSP: 002b:00007f108cb0ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 478.481741][T19400] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 478.489694][T19400] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 478.497650][T19400] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 478.505603][T19400] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f108cb0b6d4 [ 478.513554][T19400] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:21 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, 0x0, 0x0) 19:55:21 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0300b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:21 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, 0x0, 0x0) 19:55:21 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf040ab0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:21 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x12) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000280)=""/219, 0xdb}, {&(0x7f0000000380)=""/136, 0x88}, {&(0x7f0000000440)}], 0x3, &(0x7f0000000580)=""/4096, 0x1000}, 0x40000000) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) r4 = socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f0000000040)=r3, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) mkdirat$cgroup(r3, &(0x7f0000000080)='syz1\x00', 0x1ff) r5 = socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f0000000040)=r2, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) perf_event_open(&(0x7f0000001580)={0x5, 0x70, 0xff, 0x7, 0x7f, 0x3, 0x0, 0x3f, 0x8000, 0x5, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000440), 0x5}, 0x0, 0xffffffff, 0x1, 0x0, 0x8, 0x5}, 0xffffffffffffffff, 0x0, r2, 0x8) r6 = gettid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xe7, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10}, r6, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r2, &(0x7f0000000040)=r6, 0x12) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r7, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:21 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0500b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:21 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:21 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:55:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) [ 479.034755][T19437] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 479.119825][T19437] CPU: 0 PID: 19437 Comm: syz-executor.2 Not tainted 5.4.0-rc1+ #0 [ 479.127773][T19437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.137872][T19437] Call Trace: [ 479.141204][T19437] dump_stack+0x172/0x1f0 [ 479.145555][T19437] sysfs_warn_dup.cold+0x1c/0x31 [ 479.150514][T19437] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 479.156613][T19437] sysfs_create_link+0x65/0xc0 [ 479.161417][T19437] device_add+0x75c/0x17a0 [ 479.165845][T19437] ? mark_lock+0xc2/0x1220 [ 479.170277][T19437] ? uevent_show+0x370/0x370 [ 479.174881][T19437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.181147][T19437] wiphy_register+0x1c46/0x2720 [ 479.186026][T19437] ? wiphy_unregister+0x1040/0x1040 [ 479.191241][T19437] ? __kmalloc+0x608/0x770 [ 479.195670][T19437] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 479.201488][T19437] ? lockdep_hardirqs_on+0x421/0x5e0 [ 479.206791][T19437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.213049][T19437] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 479.218697][T19437] ieee80211_register_hw+0x157e/0x3ac0 [ 479.224178][T19437] ? ieee80211_ifa_changed+0xde0/0xde0 [ 479.229652][T19437] ? memset+0x32/0x40 [ 479.233652][T19437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.239903][T19437] ? __hrtimer_init+0x13d/0x280 [ 479.244781][T19437] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 479.250528][T19437] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 479.256956][T19437] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 479.262872][T19437] hwsim_new_radio_nl+0x9e3/0x1070 [ 479.268346][T19437] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 479.274245][T19437] ? nla_memcpy+0xb0/0xb0 [ 479.278593][T19437] ? __nla_parse+0x43/0x60 [ 479.283026][T19437] genl_family_rcv_msg+0x74b/0xf90 [ 479.288161][T19437] ? genl_unregister_family+0x7b0/0x7b0 [ 479.293721][T19437] ? __kasan_check_read+0x11/0x20 [ 479.298760][T19437] ? __lock_acquire+0x16f2/0x4a00 [ 479.303806][T19437] ? __dev_queue_xmit+0xbb5/0x3720 [ 479.308947][T19437] genl_rcv_msg+0xca/0x170 [ 479.313386][T19437] netlink_rcv_skb+0x177/0x450 [ 479.318156][T19437] ? genl_family_rcv_msg+0xf90/0xf90 [ 479.323455][T19437] ? netlink_ack+0xb50/0xb50 [ 479.328052][T19437] ? __kasan_check_write+0x14/0x20 [ 479.333181][T19437] ? netlink_deliver_tap+0x254/0xbf0 [ 479.338490][T19437] genl_rcv+0x29/0x40 [ 479.342479][T19437] netlink_unicast+0x531/0x710 [ 479.347260][T19437] ? netlink_attachskb+0x7c0/0x7c0 [ 479.352386][T19437] ? _copy_from_iter_full+0x25d/0x8c0 [ 479.357779][T19437] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 479.363529][T19437] ? __check_object_size+0x3d/0x437 [ 479.368752][T19437] netlink_sendmsg+0x8a5/0xd60 [ 479.373546][T19437] ? netlink_unicast+0x710/0x710 [ 479.378493][T19437] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 479.384047][T19437] ? apparmor_socket_sendmsg+0x2a/0x30 [ 479.389524][T19437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.395789][T19437] ? security_socket_sendmsg+0x8d/0xc0 [ 479.401262][T19437] ? netlink_unicast+0x710/0x710 [ 479.406242][T19437] sock_sendmsg+0xd7/0x130 [ 479.410673][T19437] ___sys_sendmsg+0x803/0x920 [ 479.415369][T19437] ? copy_msghdr_from_user+0x440/0x440 [ 479.420848][T19437] ? __kasan_check_read+0x11/0x20 [ 479.425887][T19437] ? __fget+0x384/0x560 [ 479.430061][T19437] ? ksys_dup3+0x3e0/0x3e0 [ 479.434491][T19437] ? __fget_light+0x1a9/0x230 [ 479.439175][T19437] ? __fdget+0x1b/0x20 [ 479.443254][T19437] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 479.449505][T19437] __sys_sendmsg+0x105/0x1d0 [ 479.454115][T19437] ? __sys_sendmsg_sock+0xd0/0xd0 [ 479.459162][T19437] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 479.464634][T19437] ? do_syscall_64+0x26/0x760 [ 479.469320][T19437] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 479.475399][T19437] ? do_syscall_64+0x26/0x760 [ 479.480096][T19437] __x64_sys_sendmsg+0x78/0xb0 [ 479.484873][T19437] do_syscall_64+0xfa/0x760 [ 479.489389][T19437] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 479.495284][T19437] RIP: 0033:0x459a59 [ 479.499191][T19437] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 479.518803][T19437] RSP: 002b:00007f108cb2bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 479.527222][T19437] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 479.535200][T19437] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 479.543176][T19437] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 479.551157][T19437] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f108cb2c6d4 [ 479.559139][T19437] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:22 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:55:22 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0600b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:22 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf040bb0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:22 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0700b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:22 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:55:22 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0800b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 480.149084][T19481] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 480.180133][T19481] CPU: 0 PID: 19481 Comm: syz-executor.2 Not tainted 5.4.0-rc1+ #0 [ 480.188100][T19481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.198257][T19481] Call Trace: [ 480.201588][T19481] dump_stack+0x172/0x1f0 [ 480.205937][T19481] sysfs_warn_dup.cold+0x1c/0x31 [ 480.210904][T19481] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 480.216993][T19481] sysfs_create_link+0x65/0xc0 [ 480.221778][T19481] device_add+0x75c/0x17a0 [ 480.226211][T19481] ? mark_lock+0xc2/0x1220 [ 480.230645][T19481] ? uevent_show+0x370/0x370 [ 480.235250][T19481] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 480.241519][T19481] wiphy_register+0x1c46/0x2720 [ 480.246591][T19481] ? wiphy_unregister+0x1040/0x1040 [ 480.251818][T19481] ? __kmalloc+0x608/0x770 [ 480.256250][T19481] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 480.262081][T19481] ? lockdep_hardirqs_on+0x421/0x5e0 [ 480.267391][T19481] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 480.273658][T19481] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 480.279327][T19481] ieee80211_register_hw+0x157e/0x3ac0 [ 480.284853][T19481] ? ieee80211_ifa_changed+0xde0/0xde0 [ 480.290341][T19481] ? memset+0x32/0x40 [ 480.294373][T19481] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 480.300631][T19481] ? __hrtimer_init+0x13d/0x280 [ 480.305505][T19481] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 480.311284][T19481] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 480.317728][T19481] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 480.323650][T19481] hwsim_new_radio_nl+0x9e3/0x1070 [ 480.328813][T19481] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 480.334727][T19481] ? nla_memcpy+0xb0/0xb0 [ 480.339092][T19481] ? __nla_parse+0x43/0x60 [ 480.343528][T19481] genl_family_rcv_msg+0x74b/0xf90 [ 480.348665][T19481] ? genl_unregister_family+0x7b0/0x7b0 [ 480.354270][T19481] ? __kasan_check_read+0x11/0x20 [ 480.359308][T19481] ? __lock_acquire+0x16f2/0x4a00 [ 480.364355][T19481] ? __dev_queue_xmit+0xbb5/0x3720 [ 480.369545][T19481] genl_rcv_msg+0xca/0x170 [ 480.373998][T19481] netlink_rcv_skb+0x177/0x450 [ 480.378771][T19481] ? genl_family_rcv_msg+0xf90/0xf90 [ 480.384072][T19481] ? netlink_ack+0xb50/0xb50 [ 480.388670][T19481] ? __kasan_check_write+0x14/0x20 [ 480.393810][T19481] ? netlink_deliver_tap+0x254/0xbf0 [ 480.399115][T19481] genl_rcv+0x29/0x40 [ 480.403119][T19481] netlink_unicast+0x531/0x710 [ 480.407900][T19481] ? netlink_attachskb+0x7c0/0x7c0 [ 480.413024][T19481] ? _copy_from_iter_full+0x25d/0x8c0 [ 480.418408][T19481] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 480.424137][T19481] ? __check_object_size+0x3d/0x437 [ 480.429356][T19481] netlink_sendmsg+0x8a5/0xd60 [ 480.434137][T19481] ? netlink_unicast+0x710/0x710 [ 480.439080][T19481] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 480.444664][T19481] ? apparmor_socket_sendmsg+0x2a/0x30 [ 480.450139][T19481] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 480.456393][T19481] ? security_socket_sendmsg+0x8d/0xc0 [ 480.461878][T19481] ? netlink_unicast+0x710/0x710 [ 480.466852][T19481] sock_sendmsg+0xd7/0x130 [ 480.471281][T19481] ___sys_sendmsg+0x803/0x920 [ 480.476003][T19481] ? copy_msghdr_from_user+0x440/0x440 [ 480.481496][T19481] ? __kasan_check_read+0x11/0x20 [ 480.486559][T19481] ? __fget+0x384/0x560 [ 480.490748][T19481] ? ksys_dup3+0x3e0/0x3e0 [ 480.495202][T19481] ? __fget_light+0x1a9/0x230 [ 480.499896][T19481] ? __fdget+0x1b/0x20 [ 480.503979][T19481] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 480.510242][T19481] __sys_sendmsg+0x105/0x1d0 [ 480.514941][T19481] ? __sys_sendmsg_sock+0xd0/0xd0 [ 480.520001][T19481] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 480.525472][T19481] ? do_syscall_64+0x26/0x760 [ 480.530166][T19481] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.536239][T19481] ? do_syscall_64+0x26/0x760 [ 480.540948][T19481] __x64_sys_sendmsg+0x78/0xb0 [ 480.545742][T19481] do_syscall_64+0xfa/0x760 [ 480.550260][T19481] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.556169][T19481] RIP: 0033:0x459a59 [ 480.560069][T19481] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 480.579686][T19481] RSP: 002b:00007f108cb2bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 480.588109][T19481] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 19:55:22 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:23 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r4, 0x0, 0x5}, 0x3c) openat$cgroup_type(r4, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r4, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x5, 0x0, 0x2, 0x6, 0x0, 0x5, 0xc0004, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfff, 0x4, @perf_config_ext={0x1, 0xf17}, 0x6002, 0xffffffffffffffff, 0xd7e, 0x1, 0x87, 0x9699, 0x2}, 0xffffffffffffffff, 0x7, r4, 0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000180)={0x2, 0x70, 0x4, 0x3, 0x8, 0x4, 0x0, 0x0, 0x10032, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x5, @perf_config_ext={0x2, 0xfffffffffffffffe}, 0x1, 0x100000000, 0x4, 0x5, 0x7, 0x6, 0x400}) 19:55:23 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:23 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 480.596094][T19481] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 480.604070][T19481] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 480.612049][T19481] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f108cb2c6d4 [ 480.620050][T19481] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:23 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0c00b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:23 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf040eb0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:23 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 19:55:23 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 19:55:23 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0e00b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 481.090320][T19518] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 481.130199][T19518] CPU: 1 PID: 19518 Comm: syz-executor.2 Not tainted 5.4.0-rc1+ #0 [ 481.138138][T19518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.148202][T19518] Call Trace: [ 481.151519][T19518] dump_stack+0x172/0x1f0 [ 481.155873][T19518] sysfs_warn_dup.cold+0x1c/0x31 [ 481.160831][T19518] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 481.166922][T19518] sysfs_create_link+0x65/0xc0 [ 481.171878][T19518] device_add+0x75c/0x17a0 [ 481.176306][T19518] ? mark_lock+0xc2/0x1220 [ 481.180741][T19518] ? uevent_show+0x370/0x370 [ 481.185346][T19518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.191613][T19518] wiphy_register+0x1c46/0x2720 [ 481.196495][T19518] ? wiphy_unregister+0x1040/0x1040 [ 481.201732][T19518] ? __kmalloc+0x608/0x770 [ 481.206162][T19518] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 481.211984][T19518] ? lockdep_hardirqs_on+0x421/0x5e0 [ 481.217286][T19518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.223634][T19518] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 481.229292][T19518] ieee80211_register_hw+0x157e/0x3ac0 [ 481.234784][T19518] ? ieee80211_ifa_changed+0xde0/0xde0 [ 481.240255][T19518] ? memset+0x32/0x40 [ 481.244338][T19518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.251113][T19518] ? __hrtimer_init+0x13d/0x280 [ 481.255989][T19518] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 481.261752][T19518] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 481.268203][T19518] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 481.274119][T19518] hwsim_new_radio_nl+0x9e3/0x1070 [ 481.279277][T19518] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 481.285201][T19518] ? nla_memcpy+0xb0/0xb0 [ 481.289557][T19518] ? __nla_parse+0x43/0x60 [ 481.293992][T19518] genl_family_rcv_msg+0x74b/0xf90 [ 481.299122][T19518] ? genl_unregister_family+0x7b0/0x7b0 [ 481.304682][T19518] ? __kasan_check_read+0x11/0x20 [ 481.309808][T19518] ? __lock_acquire+0x16f2/0x4a00 [ 481.314853][T19518] ? __dev_queue_xmit+0xbb5/0x3720 [ 481.319998][T19518] genl_rcv_msg+0xca/0x170 [ 481.324428][T19518] netlink_rcv_skb+0x177/0x450 [ 481.329328][T19518] ? genl_family_rcv_msg+0xf90/0xf90 [ 481.334627][T19518] ? netlink_ack+0xb50/0xb50 [ 481.339227][T19518] ? __kasan_check_write+0x14/0x20 [ 481.344725][T19518] ? netlink_deliver_tap+0x254/0xbf0 [ 481.350029][T19518] genl_rcv+0x29/0x40 [ 481.354019][T19518] netlink_unicast+0x531/0x710 [ 481.358795][T19518] ? netlink_attachskb+0x7c0/0x7c0 [ 481.363913][T19518] ? _copy_from_iter_full+0x25d/0x8c0 [ 481.369293][T19518] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 481.375023][T19518] ? __check_object_size+0x3d/0x437 [ 481.380237][T19518] netlink_sendmsg+0x8a5/0xd60 [ 481.385107][T19518] ? netlink_unicast+0x710/0x710 [ 481.390060][T19518] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 481.395621][T19518] ? apparmor_socket_sendmsg+0x2a/0x30 [ 481.401097][T19518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.407343][T19518] ? security_socket_sendmsg+0x8d/0xc0 [ 481.412809][T19518] ? netlink_unicast+0x710/0x710 [ 481.417758][T19518] sock_sendmsg+0xd7/0x130 [ 481.422177][T19518] ___sys_sendmsg+0x803/0x920 [ 481.426860][T19518] ? copy_msghdr_from_user+0x440/0x440 [ 481.432335][T19518] ? __kasan_check_read+0x11/0x20 [ 481.437367][T19518] ? __fget+0x384/0x560 [ 481.441534][T19518] ? ksys_dup3+0x3e0/0x3e0 [ 481.445958][T19518] ? __fget_light+0x1a9/0x230 [ 481.450627][T19518] ? __fdget+0x1b/0x20 [ 481.454728][T19518] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 481.460986][T19518] __sys_sendmsg+0x105/0x1d0 [ 481.465589][T19518] ? __sys_sendmsg_sock+0xd0/0xd0 [ 481.470638][T19518] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 481.476107][T19518] ? do_syscall_64+0x26/0x760 [ 481.480782][T19518] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.486873][T19518] ? do_syscall_64+0x26/0x760 [ 481.491567][T19518] __x64_sys_sendmsg+0x78/0xb0 [ 481.496338][T19518] do_syscall_64+0xfa/0x760 [ 481.500855][T19518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.506751][T19518] RIP: 0033:0x459a59 [ 481.510669][T19518] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 481.530283][T19518] RSP: 002b:00007f108cb2bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 481.538710][T19518] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 481.546692][T19518] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 481.554679][T19518] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 481.562662][T19518] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f108cb2c6d4 [ 481.570664][T19518] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:24 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) 19:55:24 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf1000b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:24 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0448b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 481.835546][T19538] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 481.851979][T19538] CPU: 1 PID: 19538 Comm: syz-executor.2 Not tainted 5.4.0-rc1+ #0 [ 481.860021][T19538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.870085][T19538] Call Trace: [ 481.873389][T19538] dump_stack+0x172/0x1f0 [ 481.877715][T19538] sysfs_warn_dup.cold+0x1c/0x31 [ 481.882682][T19538] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 481.888787][T19538] sysfs_create_link+0x65/0xc0 [ 481.893567][T19538] device_add+0x75c/0x17a0 [ 481.897995][T19538] ? uevent_show+0x370/0x370 [ 481.902607][T19538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.908894][T19538] wiphy_register+0x1c46/0x2720 [ 481.913769][T19538] ? wiphy_unregister+0x1040/0x1040 [ 481.918992][T19538] ? __kmalloc+0x608/0x770 [ 481.923425][T19538] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 481.929245][T19538] ? lockdep_hardirqs_on+0x421/0x5e0 [ 481.934551][T19538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.940790][T19538] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 481.946436][T19538] ieee80211_register_hw+0x157e/0x3ac0 [ 481.951912][T19538] ? ieee80211_ifa_changed+0xde0/0xde0 [ 481.957391][T19538] ? memset+0x32/0x40 [ 481.961380][T19538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.967642][T19538] ? __hrtimer_init+0x13d/0x280 [ 481.972518][T19538] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 481.978267][T19538] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 19:55:24 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) [ 481.984698][T19538] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 481.990612][T19538] hwsim_new_radio_nl+0x9e3/0x1070 [ 481.995737][T19538] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 482.001650][T19538] ? nla_memcpy+0xb0/0xb0 [ 482.006000][T19538] ? __nla_parse+0x43/0x60 [ 482.010431][T19538] genl_family_rcv_msg+0x74b/0xf90 [ 482.015565][T19538] ? genl_unregister_family+0x7b0/0x7b0 [ 482.021129][T19538] ? __kasan_check_read+0x11/0x20 [ 482.026162][T19538] ? __lock_acquire+0x16f2/0x4a00 [ 482.031177][T19538] ? __dev_queue_xmit+0xbb5/0x3720 [ 482.031209][T19538] genl_rcv_msg+0xca/0x170 [ 482.031228][T19538] netlink_rcv_skb+0x177/0x450 [ 482.045488][T19538] ? genl_family_rcv_msg+0xf90/0xf90 [ 482.050807][T19538] ? netlink_ack+0xb50/0xb50 [ 482.055414][T19538] ? __kasan_check_write+0x14/0x20 [ 482.060553][T19538] ? netlink_deliver_tap+0x254/0xbf0 [ 482.065899][T19538] genl_rcv+0x29/0x40 [ 482.069895][T19538] netlink_unicast+0x531/0x710 [ 482.074680][T19538] ? netlink_attachskb+0x7c0/0x7c0 [ 482.079832][T19538] ? _copy_from_iter_full+0x25d/0x8c0 [ 482.085220][T19538] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 482.090954][T19538] ? __check_object_size+0x3d/0x437 [ 482.096175][T19538] netlink_sendmsg+0x8a5/0xd60 [ 482.100961][T19538] ? netlink_unicast+0x710/0x710 [ 482.105913][T19538] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 482.111472][T19538] ? apparmor_socket_sendmsg+0x2a/0x30 [ 482.116948][T19538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 482.123287][T19538] ? security_socket_sendmsg+0x8d/0xc0 [ 482.128755][T19538] ? netlink_unicast+0x710/0x710 [ 482.133705][T19538] sock_sendmsg+0xd7/0x130 [ 482.138136][T19538] ___sys_sendmsg+0x803/0x920 [ 482.142828][T19538] ? copy_msghdr_from_user+0x440/0x440 [ 482.148311][T19538] ? __kasan_check_read+0x11/0x20 [ 482.153350][T19538] ? __fget+0x384/0x560 [ 482.157532][T19538] ? ksys_dup3+0x3e0/0x3e0 [ 482.161977][T19538] ? __fget_light+0x1a9/0x230 [ 482.166682][T19538] ? __fdget+0x1b/0x20 [ 482.170760][T19538] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 482.177017][T19538] __sys_sendmsg+0x105/0x1d0 [ 482.181620][T19538] ? __sys_sendmsg_sock+0xd0/0xd0 [ 482.186675][T19538] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 482.192148][T19538] ? do_syscall_64+0x26/0x760 [ 482.196923][T19538] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 482.203001][T19538] ? do_syscall_64+0x26/0x760 [ 482.207702][T19538] __x64_sys_sendmsg+0x78/0xb0 [ 482.212493][T19538] do_syscall_64+0xfa/0x760 [ 482.217023][T19538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 482.222931][T19538] RIP: 0033:0x459a59 [ 482.226831][T19538] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 482.246442][T19538] RSP: 002b:00007f108cb2bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 482.254870][T19538] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 482.262852][T19538] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 482.270838][T19538] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 482.278823][T19538] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f108cb2c6d4 19:55:24 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x12) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r2, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000180)={0x4, 0x70, 0x3e, 0xf8, 0x8, 0x7f, 0x0, 0x101, 0xc040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xe6e9, 0x2, @perf_bp={&(0x7f0000000040), 0x7}, 0x8, 0x9fc1, 0x9, 0x1, 0x6694bd2a, 0x1}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:24 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) 19:55:24 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 482.286802][T19538] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:24 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf044cb0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:24 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf1200b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:24 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) [ 482.669621][T19569] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 482.712186][T19569] CPU: 0 PID: 19569 Comm: syz-executor.2 Not tainted 5.4.0-rc1+ #0 [ 482.720126][T19569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.730189][T19569] Call Trace: [ 482.733496][T19569] dump_stack+0x172/0x1f0 [ 482.737849][T19569] sysfs_warn_dup.cold+0x1c/0x31 [ 482.742811][T19569] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 482.748901][T19569] sysfs_create_link+0x65/0xc0 [ 482.753705][T19569] device_add+0x75c/0x17a0 [ 482.758119][T19569] ? mark_lock+0xc2/0x1220 [ 482.762532][T19569] ? uevent_show+0x370/0x370 [ 482.762548][T19569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 482.762572][T19569] wiphy_register+0x1c46/0x2720 [ 482.762595][T19569] ? wiphy_unregister+0x1040/0x1040 [ 482.783453][T19569] ? __kmalloc+0x608/0x770 [ 482.787881][T19569] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 482.793704][T19569] ? lockdep_hardirqs_on+0x421/0x5e0 [ 482.798998][T19569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 482.805246][T19569] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 482.810895][T19569] ieee80211_register_hw+0x157e/0x3ac0 [ 482.816375][T19569] ? ieee80211_ifa_changed+0xde0/0xde0 [ 482.821843][T19569] ? memset+0x32/0x40 [ 482.825839][T19569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 482.832087][T19569] ? __hrtimer_init+0x13d/0x280 [ 482.836958][T19569] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 482.842697][T19569] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 482.849124][T19569] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 482.855028][T19569] hwsim_new_radio_nl+0x9e3/0x1070 [ 482.860146][T19569] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 482.866042][T19569] ? nla_memcpy+0xb0/0xb0 [ 482.870389][T19569] ? __nla_parse+0x43/0x60 [ 482.874819][T19569] genl_family_rcv_msg+0x74b/0xf90 [ 482.879955][T19569] ? genl_unregister_family+0x7b0/0x7b0 [ 482.885548][T19569] ? __kasan_check_read+0x11/0x20 [ 482.890594][T19569] ? __lock_acquire+0x16f2/0x4a00 [ 482.895631][T19569] ? __dev_queue_xmit+0xbb5/0x3720 [ 482.900775][T19569] genl_rcv_msg+0xca/0x170 [ 482.905229][T19569] netlink_rcv_skb+0x177/0x450 [ 482.910002][T19569] ? genl_family_rcv_msg+0xf90/0xf90 [ 482.915299][T19569] ? netlink_ack+0xb50/0xb50 [ 482.919892][T19569] ? __kasan_check_write+0x14/0x20 [ 482.925015][T19569] ? netlink_deliver_tap+0x254/0xbf0 [ 482.930307][T19569] genl_rcv+0x29/0x40 [ 482.934293][T19569] netlink_unicast+0x531/0x710 [ 482.939064][T19569] ? netlink_attachskb+0x7c0/0x7c0 [ 482.944188][T19569] ? _copy_from_iter_full+0x25d/0x8c0 [ 482.949564][T19569] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 482.955309][T19569] ? __check_object_size+0x3d/0x437 [ 482.960538][T19569] netlink_sendmsg+0x8a5/0xd60 [ 482.965313][T19569] ? netlink_unicast+0x710/0x710 [ 482.970255][T19569] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 482.975811][T19569] ? apparmor_socket_sendmsg+0x2a/0x30 [ 482.981278][T19569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 482.987523][T19569] ? security_socket_sendmsg+0x8d/0xc0 [ 482.992989][T19569] ? netlink_unicast+0x710/0x710 [ 482.997934][T19569] sock_sendmsg+0xd7/0x130 [ 483.002356][T19569] ___sys_sendmsg+0x803/0x920 [ 483.007044][T19569] ? copy_msghdr_from_user+0x440/0x440 [ 483.012518][T19569] ? __kasan_check_read+0x11/0x20 [ 483.017553][T19569] ? __fget+0x384/0x560 [ 483.021719][T19569] ? ksys_dup3+0x3e0/0x3e0 [ 483.026150][T19569] ? __fget_light+0x1a9/0x230 [ 483.030832][T19569] ? __fdget+0x1b/0x20 [ 483.034907][T19569] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 483.041166][T19569] __sys_sendmsg+0x105/0x1d0 [ 483.045767][T19569] ? __sys_sendmsg_sock+0xd0/0xd0 [ 483.050827][T19569] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 483.056298][T19569] ? do_syscall_64+0x26/0x760 [ 483.060981][T19569] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.067061][T19569] ? do_syscall_64+0x26/0x760 [ 483.071752][T19569] __x64_sys_sendmsg+0x78/0xb0 [ 483.076524][T19569] do_syscall_64+0xfa/0x760 [ 483.081036][T19569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.086932][T19569] RIP: 0033:0x459a59 [ 483.090834][T19569] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:55:25 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf1900b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 483.110441][T19569] RSP: 002b:00007f108cb2bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 483.118862][T19569] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 483.126840][T19569] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 483.134817][T19569] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 483.142792][T19569] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f108cb2c6d4 [ 483.150775][T19569] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:25 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) 19:55:25 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf1a00b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:25 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0460b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:25 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) 19:55:25 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) [ 483.446267][T19589] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 483.517903][T19589] CPU: 1 PID: 19589 Comm: syz-executor.2 Not tainted 5.4.0-rc1+ #0 [ 483.525828][T19589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.535923][T19589] Call Trace: [ 483.539309][T19589] dump_stack+0x172/0x1f0 [ 483.543662][T19589] sysfs_warn_dup.cold+0x1c/0x31 [ 483.548618][T19589] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 483.554710][T19589] sysfs_create_link+0x65/0xc0 [ 483.559576][T19589] device_add+0x75c/0x17a0 19:55:25 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 483.564006][T19589] ? mark_lock+0xc2/0x1220 [ 483.568447][T19589] ? uevent_show+0x370/0x370 [ 483.573055][T19589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.579320][T19589] wiphy_register+0x1c46/0x2720 [ 483.584200][T19589] ? wiphy_unregister+0x1040/0x1040 [ 483.589415][T19589] ? __kmalloc+0x608/0x770 [ 483.593844][T19589] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 483.599660][T19589] ? lockdep_hardirqs_on+0x421/0x5e0 [ 483.604962][T19589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.611216][T19589] ? ieee80211_cs_list_valid+0x1a1/0x280 19:55:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x12) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r3, 0x0, 0x5}, 0x3c) openat$cgroup_type(r3, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r3, 0x0) getpid() r4 = gettid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xe7, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10}, r4, 0x0, 0xffffffffffffffff, 0x0) r5 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r5, 0xffffffffffffffff, 0x0, 0x55, &(0x7f0000000200)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B'}, 0x30) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r6, 0x10, &(0x7f00000005c0)={&(0x7f0000000540)=""/80, 0x50, 0xffffffffffffffff}}, 0x1b5) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x14, &(0x7f0000000ac0)=ANY=[@ANYBLOB="b702000003000002bfa30000000000000703000000feffff7a0af0fff8ffffff79a4ff0048d267df060000fffffffb41ce4f000000000065040400010000000000000000006a0a00fe00000000850000871cd52d6f43ad37900ea30647df659e3c2ea7e5b70137453072080eb0d767cd0800000038f9fdfa6e69e7285800000000000000000000eaffffffffff070000000000620ed03954675eb3d05aeb0c7008395eba0dbf486744ef66061e2294dbbc9a27cd16869ef83161e32da77236174bbf00d5d26dd00ba6582c69af70a46dde5f674b67500f287d0075353c9d11f302a5f32e8e850f11ec3fb7538045327b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000026c0)={r6}) perf_event_open(&(0x7f0000000a40)={0x5, 0x70, 0xfd, 0x40, 0x1, 0x89, 0x0, 0x1, 0xc010, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x865173e240c3f3b3, 0x200, 0x4, 0x8, 0x562, 0x6, 0x2b}, r5, 0xe, r6, 0x8) write$cgroup_pid(r3, &(0x7f0000000040)=r5, 0x12) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 483.616869][T19589] ieee80211_register_hw+0x157e/0x3ac0 [ 483.622356][T19589] ? ieee80211_ifa_changed+0xde0/0xde0 [ 483.627832][T19589] ? memset+0x32/0x40 [ 483.631830][T19589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.638085][T19589] ? __hrtimer_init+0x13d/0x280 [ 483.642966][T19589] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 483.648715][T19589] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 483.655154][T19589] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 483.661070][T19589] hwsim_new_radio_nl+0x9e3/0x1070 [ 483.666901][T19589] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 483.672811][T19589] ? nla_memcpy+0xb0/0xb0 [ 483.677165][T19589] ? __nla_parse+0x43/0x60 [ 483.681598][T19589] genl_family_rcv_msg+0x74b/0xf90 [ 483.686745][T19589] ? genl_unregister_family+0x7b0/0x7b0 [ 483.692322][T19589] ? __kasan_check_read+0x11/0x20 [ 483.697359][T19589] ? __lock_acquire+0x16f2/0x4a00 [ 483.702415][T19589] ? __dev_queue_xmit+0xbb5/0x3720 [ 483.707557][T19589] genl_rcv_msg+0xca/0x170 [ 483.711990][T19589] netlink_rcv_skb+0x177/0x450 [ 483.716768][T19589] ? genl_family_rcv_msg+0xf90/0xf90 [ 483.722072][T19589] ? netlink_ack+0xb50/0xb50 [ 483.726671][T19589] ? __kasan_check_write+0x14/0x20 [ 483.731794][T19589] ? netlink_deliver_tap+0x254/0xbf0 [ 483.737104][T19589] genl_rcv+0x29/0x40 [ 483.741092][T19589] netlink_unicast+0x531/0x710 [ 483.745874][T19589] ? netlink_attachskb+0x7c0/0x7c0 [ 483.750994][T19589] ? _copy_from_iter_full+0x25d/0x8c0 [ 483.756386][T19589] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 483.762116][T19589] ? __check_object_size+0x3d/0x437 [ 483.767343][T19589] netlink_sendmsg+0x8a5/0xd60 [ 483.772124][T19589] ? netlink_unicast+0x710/0x710 [ 483.777074][T19589] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 483.782636][T19589] ? apparmor_socket_sendmsg+0x2a/0x30 [ 483.788109][T19589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.794371][T19589] ? security_socket_sendmsg+0x8d/0xc0 [ 483.799842][T19589] ? netlink_unicast+0x710/0x710 [ 483.804794][T19589] sock_sendmsg+0xd7/0x130 [ 483.809219][T19589] ___sys_sendmsg+0x803/0x920 [ 483.813909][T19589] ? copy_msghdr_from_user+0x440/0x440 [ 483.819388][T19589] ? __kasan_check_read+0x11/0x20 [ 483.824429][T19589] ? __fget+0x384/0x560 [ 483.828604][T19589] ? ksys_dup3+0x3e0/0x3e0 [ 483.833043][T19589] ? __fget_light+0x1a9/0x230 [ 483.837787][T19589] ? __fdget+0x1b/0x20 [ 483.841870][T19589] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 483.848167][T19589] __sys_sendmsg+0x105/0x1d0 [ 483.852777][T19589] ? __sys_sendmsg_sock+0xd0/0xd0 [ 483.857856][T19589] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 483.863362][T19589] ? do_syscall_64+0x26/0x760 [ 483.868063][T19589] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.874159][T19589] ? do_syscall_64+0x26/0x760 [ 483.878863][T19589] __x64_sys_sendmsg+0x78/0xb0 [ 483.883644][T19589] do_syscall_64+0xfa/0x760 [ 483.888163][T19589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.894062][T19589] RIP: 0033:0x459a59 [ 483.897963][T19589] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 483.917691][T19589] RSP: 002b:00007f108cb2bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 483.926115][T19589] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 483.934099][T19589] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 483.942083][T19589] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 483.950064][T19589] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f108cb2c6d4 [ 483.958050][T19589] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:26 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf5800b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:26 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) 19:55:26 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0468b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:26 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf5a00b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 484.360143][T19624] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 484.382695][T19624] CPU: 0 PID: 19624 Comm: syz-executor.2 Not tainted 5.4.0-rc1+ #0 [ 484.390626][T19624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.400690][T19624] Call Trace: [ 484.404000][T19624] dump_stack+0x172/0x1f0 [ 484.408359][T19624] sysfs_warn_dup.cold+0x1c/0x31 [ 484.413346][T19624] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 484.419433][T19624] sysfs_create_link+0x65/0xc0 [ 484.424216][T19624] device_add+0x75c/0x17a0 [ 484.428644][T19624] ? mark_lock+0xc2/0x1220 [ 484.433074][T19624] ? uevent_show+0x370/0x370 [ 484.437673][T19624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.443937][T19624] wiphy_register+0x1c46/0x2720 [ 484.448815][T19624] ? wiphy_unregister+0x1040/0x1040 [ 484.454019][T19624] ? __kmalloc+0x608/0x770 [ 484.454036][T19624] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 484.454051][T19624] ? lockdep_hardirqs_on+0x421/0x5e0 [ 484.454066][T19624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.454084][T19624] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 484.469597][T19624] ieee80211_register_hw+0x157e/0x3ac0 [ 484.469629][T19624] ? ieee80211_ifa_changed+0xde0/0xde0 [ 484.492378][T19624] ? memset+0x32/0x40 [ 484.496395][T19624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.502651][T19624] ? __hrtimer_init+0x13d/0x280 19:55:26 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0500b0eb040018", 0x17}], 0x1}, 0x0) [ 484.507538][T19624] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 484.513290][T19624] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 484.519731][T19624] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 484.525649][T19624] hwsim_new_radio_nl+0x9e3/0x1070 [ 484.530782][T19624] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 484.536690][T19624] ? nla_memcpy+0xb0/0xb0 [ 484.541050][T19624] ? __nla_parse+0x43/0x60 [ 484.545485][T19624] genl_family_rcv_msg+0x74b/0xf90 [ 484.550626][T19624] ? genl_unregister_family+0x7b0/0x7b0 [ 484.556184][T19624] ? __kasan_check_read+0x11/0x20 [ 484.561220][T19624] ? __lock_acquire+0x16f2/0x4a00 [ 484.566257][T19624] ? __dev_queue_xmit+0xbb5/0x3720 [ 484.571405][T19624] genl_rcv_msg+0xca/0x170 [ 484.575841][T19624] netlink_rcv_skb+0x177/0x450 [ 484.580618][T19624] ? genl_family_rcv_msg+0xf90/0xf90 [ 484.585919][T19624] ? netlink_ack+0xb50/0xb50 [ 484.590523][T19624] ? __kasan_check_write+0x14/0x20 [ 484.595647][T19624] ? netlink_deliver_tap+0x254/0xbf0 [ 484.600947][T19624] genl_rcv+0x29/0x40 [ 484.604966][T19624] netlink_unicast+0x531/0x710 [ 484.609773][T19624] ? netlink_attachskb+0x7c0/0x7c0 [ 484.614896][T19624] ? _copy_from_iter_full+0x25d/0x8c0 [ 484.620279][T19624] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 484.626019][T19624] ? __check_object_size+0x3d/0x437 [ 484.631235][T19624] netlink_sendmsg+0x8a5/0xd60 [ 484.636018][T19624] ? netlink_unicast+0x710/0x710 [ 484.640964][T19624] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 484.646526][T19624] ? apparmor_socket_sendmsg+0x2a/0x30 [ 484.652001][T19624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.658250][T19624] ? security_socket_sendmsg+0x8d/0xc0 [ 484.663718][T19624] ? netlink_unicast+0x710/0x710 [ 484.668665][T19624] sock_sendmsg+0xd7/0x130 [ 484.673091][T19624] ___sys_sendmsg+0x803/0x920 [ 484.677777][T19624] ? copy_msghdr_from_user+0x440/0x440 [ 484.683253][T19624] ? __kasan_check_read+0x11/0x20 [ 484.688291][T19624] ? __fget+0x384/0x560 [ 484.692473][T19624] ? ksys_dup3+0x3e0/0x3e0 [ 484.696899][T19624] ? __fget_light+0x1a9/0x230 [ 484.701581][T19624] ? __fdget+0x1b/0x20 [ 484.705655][T19624] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 484.711911][T19624] __sys_sendmsg+0x105/0x1d0 [ 484.716511][T19624] ? __sys_sendmsg_sock+0xd0/0xd0 [ 484.721556][T19624] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 484.727028][T19624] ? do_syscall_64+0x26/0x760 [ 484.731719][T19624] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.737797][T19624] ? do_syscall_64+0x26/0x760 [ 484.742493][T19624] __x64_sys_sendmsg+0x78/0xb0 [ 484.747269][T19624] do_syscall_64+0xfa/0x760 [ 484.751787][T19624] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.757684][T19624] RIP: 0033:0x459a59 [ 484.761584][T19624] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 484.781193][T19624] RSP: 002b:00007f108cb2bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 484.789617][T19624] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 484.797597][T19624] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 484.805577][T19624] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 484.813585][T19624] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f108cb2c6d4 [ 484.821566][T19624] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:27 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf046cb0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:27 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0500b0eb040018", 0x17}], 0x1}, 0x0) [ 484.893504][ T46] device bridge_slave_1 left promiscuous mode [ 484.899791][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.973292][ T46] device bridge_slave_0 left promiscuous mode [ 484.979590][ T46] bridge0: port 1(bridge_slave_0) entered disabled state 19:55:27 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:27 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 485.044386][ T46] device bridge_slave_1 left promiscuous mode [ 485.050701][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 485.149527][ T46] device bridge_slave_0 left promiscuous mode [ 485.157558][ T46] bridge0: port 1(bridge_slave_0) entered disabled state 19:55:28 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:29 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:29 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:29 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:29 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 490.642506][ T46] device hsr_slave_0 left promiscuous mode [ 490.691993][ T46] device hsr_slave_1 left promiscuous mode [ 490.755832][ T46] device team_slave_1 left promiscuous mode [ 490.763940][ T46] team0 (unregistering): Port device team_slave_1 removed [ 490.776978][ T46] device team_slave_0 left promiscuous mode [ 490.785401][ T46] team0 (unregistering): Port device team_slave_0 removed [ 490.796810][ T46] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 490.848369][ T46] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 490.948497][ T46] bond0 (unregistering): Released all slaves [ 491.102611][ T46] device hsr_slave_0 left promiscuous mode [ 491.162080][ T46] device hsr_slave_1 left promiscuous mode [ 491.241011][ T46] team0 (unregistering): Port device team_slave_1 removed [ 491.259016][ T46] team0 (unregistering): Port device team_slave_0 removed [ 491.270338][ T46] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 491.336894][ T46] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 491.437198][ T46] bond0 (unregistering): Released all slaves 19:55:33 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf7100b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:33 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 491.569046][T19644] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 491.598312][T19644] CPU: 1 PID: 19644 Comm: syz-executor.2 Not tainted 5.4.0-rc1+ #0 [ 491.606249][T19644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.616313][T19644] Call Trace: [ 491.619608][T19644] dump_stack+0x172/0x1f0 [ 491.623957][T19644] sysfs_warn_dup.cold+0x1c/0x31 [ 491.628903][T19644] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 491.634994][T19644] sysfs_create_link+0x65/0xc0 [ 491.639770][T19644] device_add+0x75c/0x17a0 [ 491.644196][T19644] ? mark_lock+0xc2/0x1220 [ 491.648620][T19644] ? uevent_show+0x370/0x370 [ 491.653214][T19644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.659478][T19644] wiphy_register+0x1c46/0x2720 [ 491.664342][T19644] ? wiphy_unregister+0x1040/0x1040 [ 491.664362][T19644] ? __kmalloc+0x608/0x770 [ 491.664376][T19644] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 491.664392][T19644] ? lockdep_hardirqs_on+0x421/0x5e0 [ 491.664413][T19644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.685059][T19644] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 491.696909][T19644] ieee80211_register_hw+0x157e/0x3ac0 [ 491.702384][T19644] ? ieee80211_ifa_changed+0xde0/0xde0 [ 491.707856][T19644] ? memset+0x32/0x40 [ 491.711848][T19644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.718957][T19644] ? __hrtimer_init+0x13d/0x280 [ 491.723836][T19644] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 491.729662][T19644] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 491.736095][T19644] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 491.742000][T19644] hwsim_new_radio_nl+0x9e3/0x1070 [ 491.747123][T19644] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 491.753027][T19644] ? nla_memcpy+0xb0/0xb0 [ 491.757375][T19644] ? __nla_parse+0x43/0x60 [ 491.761804][T19644] genl_family_rcv_msg+0x74b/0xf90 [ 491.766936][T19644] ? genl_unregister_family+0x7b0/0x7b0 [ 491.772506][T19644] ? __kasan_check_read+0x11/0x20 [ 491.777543][T19644] ? __lock_acquire+0x16f2/0x4a00 [ 491.782595][T19644] ? __dev_queue_xmit+0xbb5/0x3720 [ 491.787735][T19644] genl_rcv_msg+0xca/0x170 [ 491.792183][T19644] netlink_rcv_skb+0x177/0x450 [ 491.796963][T19644] ? genl_family_rcv_msg+0xf90/0xf90 [ 491.802341][T19644] ? netlink_ack+0xb50/0xb50 [ 491.806935][T19644] ? __kasan_check_write+0x14/0x20 [ 491.812054][T19644] ? netlink_deliver_tap+0x254/0xbf0 [ 491.817357][T19644] genl_rcv+0x29/0x40 [ 491.821351][T19644] netlink_unicast+0x531/0x710 [ 491.826134][T19644] ? netlink_attachskb+0x7c0/0x7c0 [ 491.831262][T19644] ? _copy_from_iter_full+0x25d/0x8c0 [ 491.836657][T19644] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 491.842377][T19644] ? __check_object_size+0x3d/0x437 [ 491.842400][T19644] netlink_sendmsg+0x8a5/0xd60 [ 491.842419][T19644] ? netlink_unicast+0x710/0x710 [ 491.842432][T19644] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 491.842448][T19644] ? apparmor_socket_sendmsg+0x2a/0x30 [ 491.842469][T19644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.862856][T19644] ? security_socket_sendmsg+0x8d/0xc0 [ 491.879975][T19644] ? netlink_unicast+0x710/0x710 [ 491.884927][T19644] sock_sendmsg+0xd7/0x130 [ 491.889369][T19644] ___sys_sendmsg+0x803/0x920 [ 491.894057][T19644] ? copy_msghdr_from_user+0x440/0x440 [ 491.899534][T19644] ? __kasan_check_read+0x11/0x20 [ 491.904569][T19644] ? __fget+0x384/0x560 [ 491.908758][T19644] ? ksys_dup3+0x3e0/0x3e0 [ 491.913199][T19644] ? __fget_light+0x1a9/0x230 [ 491.917884][T19644] ? __fdget+0x1b/0x20 [ 491.921948][T19644] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 491.928192][T19644] __sys_sendmsg+0x105/0x1d0 [ 491.932775][T19644] ? __sys_sendmsg_sock+0xd0/0xd0 [ 491.937797][T19644] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 491.943242][T19644] ? do_syscall_64+0x26/0x760 [ 491.947912][T19644] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.953973][T19644] ? do_syscall_64+0x26/0x760 [ 491.958652][T19644] __x64_sys_sendmsg+0x78/0xb0 [ 491.963431][T19644] do_syscall_64+0xfa/0x760 [ 491.967938][T19644] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.973821][T19644] RIP: 0033:0x459a59 [ 491.977717][T19644] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 491.997319][T19644] RSP: 002b:00007f108cb0ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 492.005722][T19644] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 492.013681][T19644] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 492.021647][T19644] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 492.029615][T19644] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f108cb0b6d4 [ 492.037696][T19644] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:34 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0474b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:34 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0500b0eb040018", 0x17}], 0x1}, 0x0) 19:55:34 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:34 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:34 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0058b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:34 executing program 1: socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000040)=r0, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x12) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r3, 0x0, 0x5}, 0x3c) openat$cgroup_type(r3, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r3, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x13) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r4, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r5}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0xe, &(0x7f0000000040)='memory.events\x00', r5}, 0x30) r6 = gettid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xe7, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10}, r6, 0x0, 0xffffffffffffffff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x6, 0xaf, 0x80, 0x6, 0x0, 0x1ff, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x100, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x2080, 0x82a9, 0x68, 0x7, 0x40, 0x744ead11, 0x4}, r6, 0xc, 0xffffffffffffffff, 0x12) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0xc) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r9, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:34 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0500b0eb04001800160011000586f9835b3f2f", 0x23}], 0x1}, 0x0) 19:55:34 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf005ab0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:34 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0500b0eb04001800160011000586f9835b3f2f", 0x23}], 0x1}, 0x0) 19:55:35 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:35 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0071b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 492.763063][T19733] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 492.866600][T19733] CPU: 0 PID: 19733 Comm: syz-executor.2 Not tainted 5.4.0-rc1+ #0 [ 492.874536][T19733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.884629][T19733] Call Trace: [ 492.887945][T19733] dump_stack+0x172/0x1f0 [ 492.892296][T19733] sysfs_warn_dup.cold+0x1c/0x31 [ 492.897251][T19733] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 492.903335][T19733] sysfs_create_link+0x65/0xc0 [ 492.908114][T19733] device_add+0x75c/0x17a0 [ 492.912545][T19733] ? mark_lock+0xc2/0x1220 [ 492.916972][T19733] ? uevent_show+0x370/0x370 [ 492.921569][T19733] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 492.928094][T19733] wiphy_register+0x1c46/0x2720 [ 492.932964][T19733] ? wiphy_unregister+0x1040/0x1040 [ 492.938174][T19733] ? __kmalloc+0x608/0x770 [ 492.942600][T19733] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 492.948415][T19733] ? lockdep_hardirqs_on+0x421/0x5e0 [ 492.953715][T19733] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 492.959964][T19733] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 492.965612][T19733] ieee80211_register_hw+0x157e/0x3ac0 [ 492.971097][T19733] ? ieee80211_ifa_changed+0xde0/0xde0 [ 492.976573][T19733] ? memset+0x32/0x40 [ 492.980570][T19733] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 492.986823][T19733] ? __hrtimer_init+0x13d/0x280 [ 492.991694][T19733] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 492.997436][T19733] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 493.003866][T19733] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 493.009772][T19733] hwsim_new_radio_nl+0x9e3/0x1070 [ 493.014899][T19733] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 493.020797][T19733] ? nla_memcpy+0xb0/0xb0 [ 493.025145][T19733] ? __nla_parse+0x43/0x60 [ 493.029575][T19733] genl_family_rcv_msg+0x74b/0xf90 [ 493.034713][T19733] ? genl_unregister_family+0x7b0/0x7b0 [ 493.040269][T19733] ? __kasan_check_read+0x11/0x20 [ 493.045301][T19733] ? __lock_acquire+0x16f2/0x4a00 [ 493.050339][T19733] ? __dev_queue_xmit+0xbb5/0x3720 [ 493.055488][T19733] genl_rcv_msg+0xca/0x170 [ 493.059926][T19733] netlink_rcv_skb+0x177/0x450 [ 493.064710][T19733] ? genl_family_rcv_msg+0xf90/0xf90 [ 493.070006][T19733] ? netlink_ack+0xb50/0xb50 [ 493.074601][T19733] ? __kasan_check_write+0x14/0x20 [ 493.079729][T19733] ? netlink_deliver_tap+0x254/0xbf0 [ 493.085115][T19733] genl_rcv+0x29/0x40 [ 493.089106][T19733] netlink_unicast+0x531/0x710 [ 493.093881][T19733] ? netlink_attachskb+0x7c0/0x7c0 [ 493.099004][T19733] ? _copy_from_iter_full+0x25d/0x8c0 [ 493.104388][T19733] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 493.110114][T19733] ? __check_object_size+0x3d/0x437 [ 493.115331][T19733] netlink_sendmsg+0x8a5/0xd60 [ 493.120113][T19733] ? netlink_unicast+0x710/0x710 [ 493.125061][T19733] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 493.130618][T19733] ? apparmor_socket_sendmsg+0x2a/0x30 [ 493.136089][T19733] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 493.142337][T19733] ? security_socket_sendmsg+0x8d/0xc0 [ 493.147804][T19733] ? netlink_unicast+0x710/0x710 [ 493.152754][T19733] sock_sendmsg+0xd7/0x130 [ 493.157179][T19733] ___sys_sendmsg+0x803/0x920 [ 493.161865][T19733] ? copy_msghdr_from_user+0x440/0x440 [ 493.167348][T19733] ? __kasan_check_read+0x11/0x20 [ 493.172390][T19733] ? __fget+0x384/0x560 [ 493.176568][T19733] ? ksys_dup3+0x3e0/0x3e0 [ 493.180998][T19733] ? __fget_light+0x1a9/0x230 [ 493.185679][T19733] ? __fdget+0x1b/0x20 [ 493.189769][T19733] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 493.196023][T19733] __sys_sendmsg+0x105/0x1d0 [ 493.200628][T19733] ? __sys_sendmsg_sock+0xd0/0xd0 [ 493.205675][T19733] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 493.211146][T19733] ? do_syscall_64+0x26/0x760 [ 493.215835][T19733] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 493.221910][T19733] ? do_syscall_64+0x26/0x760 [ 493.226602][T19733] __x64_sys_sendmsg+0x78/0xb0 [ 493.231378][T19733] do_syscall_64+0xfa/0x760 [ 493.235920][T19733] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 493.241813][T19733] RIP: 0033:0x459a59 [ 493.245720][T19733] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:55:35 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0500b0eb04001800160011000586f9835b3f2f", 0x23}], 0x1}, 0x0) [ 493.265336][T19733] RSP: 002b:00007f108cb0ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 493.273763][T19733] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 493.281745][T19733] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 493.289699][T19733] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 493.297650][T19733] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f108cb0b6d4 [ 493.305603][T19733] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:35 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf047ab0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:35 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0500b0eb04001800160011000586f9835b3f2f009148790000", 0x29}], 0x1}, 0x0) 19:55:36 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:36 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf040088eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:36 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0500b0eb04001800160011000586f9835b3f2f009148790000", 0x29}], 0x1}, 0x0) 19:55:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r2, 0x0, 0xe, &(0x7f0000000040)='memory.events\x00'}, 0x30) write$cgroup_pid(r1, &(0x7f0000000100)=r3, 0x12) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:36 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 493.758944][T19756] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 493.811588][T19756] CPU: 1 PID: 19756 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 493.819526][T19756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.829591][T19756] Call Trace: [ 493.832902][T19756] dump_stack+0x172/0x1f0 [ 493.837245][T19756] sysfs_warn_dup.cold+0x1c/0x31 [ 493.842195][T19756] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 493.848277][T19756] sysfs_create_link+0x65/0xc0 [ 493.853055][T19756] device_add+0x75c/0x17a0 [ 493.857492][T19756] ? mark_lock+0xc2/0x1220 [ 493.861919][T19756] ? uevent_show+0x370/0x370 [ 493.866528][T19756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 493.872795][T19756] wiphy_register+0x1c46/0x2720 [ 493.877664][T19756] ? wiphy_unregister+0x1040/0x1040 [ 493.882883][T19756] ? __kmalloc+0x608/0x770 [ 493.887314][T19756] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 493.893141][T19756] ? lockdep_hardirqs_on+0x421/0x5e0 [ 493.898488][T19756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 493.904746][T19756] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 493.910401][T19756] ieee80211_register_hw+0x157e/0x3ac0 [ 493.915886][T19756] ? ieee80211_ifa_changed+0xde0/0xde0 [ 493.921357][T19756] ? memset+0x32/0x40 [ 493.925353][T19756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 493.931606][T19756] ? __hrtimer_init+0x13d/0x280 [ 493.936480][T19756] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 493.942239][T19756] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 493.948671][T19756] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 493.954706][T19756] hwsim_new_radio_nl+0x9e3/0x1070 [ 493.959846][T19756] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 493.965765][T19756] ? nla_memcpy+0xb0/0xb0 [ 493.970125][T19756] ? __nla_parse+0x43/0x60 [ 493.974560][T19756] genl_family_rcv_msg+0x74b/0xf90 [ 493.979696][T19756] ? genl_unregister_family+0x7b0/0x7b0 [ 493.985265][T19756] ? __kasan_check_read+0x11/0x20 [ 493.990305][T19756] ? __lock_acquire+0x16f2/0x4a00 [ 493.995345][T19756] ? __dev_queue_xmit+0xbb5/0x3720 [ 494.000487][T19756] genl_rcv_msg+0xca/0x170 [ 494.004929][T19756] netlink_rcv_skb+0x177/0x450 [ 494.009706][T19756] ? genl_family_rcv_msg+0xf90/0xf90 [ 494.015004][T19756] ? netlink_ack+0xb50/0xb50 [ 494.019604][T19756] ? __kasan_check_write+0x14/0x20 [ 494.024733][T19756] ? netlink_deliver_tap+0x254/0xbf0 [ 494.030044][T19756] genl_rcv+0x29/0x40 [ 494.034071][T19756] netlink_unicast+0x531/0x710 [ 494.038960][T19756] ? netlink_attachskb+0x7c0/0x7c0 [ 494.044096][T19756] ? _copy_from_iter_full+0x25d/0x8c0 [ 494.049488][T19756] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 494.055222][T19756] ? __check_object_size+0x3d/0x437 [ 494.060451][T19756] netlink_sendmsg+0x8a5/0xd60 [ 494.065242][T19756] ? netlink_unicast+0x710/0x710 [ 494.070193][T19756] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 494.075756][T19756] ? apparmor_socket_sendmsg+0x2a/0x30 [ 494.081241][T19756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 494.087493][T19756] ? security_socket_sendmsg+0x8d/0xc0 [ 494.092972][T19756] ? netlink_unicast+0x710/0x710 [ 494.097921][T19756] sock_sendmsg+0xd7/0x130 [ 494.102351][T19756] ___sys_sendmsg+0x803/0x920 [ 494.107041][T19756] ? copy_msghdr_from_user+0x440/0x440 [ 494.112519][T19756] ? __kasan_check_read+0x11/0x20 [ 494.117574][T19756] ? __fget+0x384/0x560 [ 494.121781][T19756] ? ksys_dup3+0x3e0/0x3e0 [ 494.126214][T19756] ? __fget_light+0x1a9/0x230 [ 494.130900][T19756] ? __fdget+0x1b/0x20 [ 494.134983][T19756] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 494.141242][T19756] __sys_sendmsg+0x105/0x1d0 [ 494.145846][T19756] ? __sys_sendmsg_sock+0xd0/0xd0 [ 494.150917][T19756] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 494.156398][T19756] ? do_syscall_64+0x26/0x760 [ 494.161093][T19756] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.167168][T19756] ? do_syscall_64+0x26/0x760 [ 494.171863][T19756] __x64_sys_sendmsg+0x78/0xb0 [ 494.176636][T19756] do_syscall_64+0xfa/0x760 [ 494.181150][T19756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.187052][T19756] RIP: 0033:0x459a59 [ 494.190960][T19756] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 494.210574][T19756] RSP: 002b:00007f4bf17e3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 494.219000][T19756] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 494.226983][T19756] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 494.234963][T19756] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 494.242946][T19756] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf17e46d4 [ 494.250927][T19756] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff [ 494.289544][T19776] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 494.310874][T19776] CPU: 1 PID: 19776 Comm: syz-executor.2 Not tainted 5.4.0-rc1+ #0 [ 494.318811][T19776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.328887][T19776] Call Trace: [ 494.332201][T19776] dump_stack+0x172/0x1f0 [ 494.336560][T19776] sysfs_warn_dup.cold+0x1c/0x31 [ 494.341527][T19776] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 494.347615][T19776] sysfs_create_link+0x65/0xc0 [ 494.352394][T19776] device_add+0x75c/0x17a0 [ 494.356823][T19776] ? mark_lock+0xc2/0x1220 [ 494.361254][T19776] ? uevent_show+0x370/0x370 [ 494.365854][T19776] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 494.372117][T19776] wiphy_register+0x1c46/0x2720 [ 494.376990][T19776] ? wiphy_unregister+0x1040/0x1040 [ 494.382199][T19776] ? __kmalloc+0x608/0x770 [ 494.386618][T19776] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 494.392522][T19776] ? lockdep_hardirqs_on+0x421/0x5e0 [ 494.397813][T19776] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 494.404057][T19776] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 494.409699][T19776] ieee80211_register_hw+0x157e/0x3ac0 [ 494.415175][T19776] ? ieee80211_ifa_changed+0xde0/0xde0 [ 494.420642][T19776] ? memset+0x32/0x40 [ 494.424630][T19776] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 494.430872][T19776] ? __hrtimer_init+0x13d/0x280 [ 494.435742][T19776] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 494.441469][T19776] ? __kasan_check_read+0x11/0x20 [ 494.446523][T19776] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 494.452949][T19776] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 494.459202][T19776] hwsim_new_radio_nl+0x9e3/0x1070 [ 494.464321][T19776] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 494.470221][T19776] ? nla_memcpy+0xb0/0xb0 [ 494.474572][T19776] ? __nla_parse+0x43/0x60 [ 494.479004][T19776] genl_family_rcv_msg+0x74b/0xf90 [ 494.484141][T19776] ? genl_unregister_family+0x7b0/0x7b0 [ 494.489707][T19776] ? __kasan_check_read+0x11/0x20 [ 494.494742][T19776] ? __lock_acquire+0x16f2/0x4a00 [ 494.499868][T19776] ? __dev_queue_xmit+0xbb5/0x3720 [ 494.505015][T19776] genl_rcv_msg+0xca/0x170 [ 494.509447][T19776] netlink_rcv_skb+0x177/0x450 [ 494.514222][T19776] ? genl_family_rcv_msg+0xf90/0xf90 [ 494.519528][T19776] ? netlink_ack+0xb50/0xb50 [ 494.524128][T19776] ? __kasan_check_write+0x14/0x20 [ 494.529254][T19776] ? netlink_deliver_tap+0x254/0xbf0 [ 494.534552][T19776] genl_rcv+0x29/0x40 [ 494.538544][T19776] netlink_unicast+0x531/0x710 [ 494.543327][T19776] ? netlink_attachskb+0x7c0/0x7c0 [ 494.548469][T19776] ? _copy_from_iter_full+0x25d/0x8c0 [ 494.553860][T19776] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 494.559589][T19776] ? __check_object_size+0x3d/0x437 [ 494.564803][T19776] netlink_sendmsg+0x8a5/0xd60 [ 494.569589][T19776] ? netlink_unicast+0x710/0x710 [ 494.574536][T19776] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 494.580094][T19776] ? apparmor_socket_sendmsg+0x2a/0x30 [ 494.585563][T19776] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 494.591806][T19776] ? security_socket_sendmsg+0x8d/0xc0 [ 494.597300][T19776] ? netlink_unicast+0x710/0x710 [ 494.602248][T19776] sock_sendmsg+0xd7/0x130 [ 494.606674][T19776] ___sys_sendmsg+0x803/0x920 [ 494.611368][T19776] ? copy_msghdr_from_user+0x440/0x440 [ 494.616852][T19776] ? __kasan_check_read+0x11/0x20 [ 494.621892][T19776] ? __fget+0x384/0x560 [ 494.626060][T19776] ? ksys_dup3+0x3e0/0x3e0 [ 494.630490][T19776] ? __fget_light+0x1a9/0x230 [ 494.635176][T19776] ? __fdget+0x1b/0x20 [ 494.639255][T19776] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 494.645519][T19776] __sys_sendmsg+0x105/0x1d0 [ 494.650117][T19776] ? __sys_sendmsg_sock+0xd0/0xd0 [ 494.655170][T19776] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 494.660641][T19776] ? do_syscall_64+0x26/0x760 [ 494.665323][T19776] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.671398][T19776] ? do_syscall_64+0x26/0x760 [ 494.676094][T19776] __x64_sys_sendmsg+0x78/0xb0 [ 494.680868][T19776] do_syscall_64+0xfa/0x760 [ 494.685383][T19776] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.691300][T19776] RIP: 0033:0x459a59 [ 494.695201][T19776] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 494.714807][T19776] RSP: 002b:00007f108cb0ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 494.723252][T19776] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 494.731236][T19776] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 19:55:37 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0500b0eb04001800160011000586f9835b3f2f009148790000", 0x29}], 0x1}, 0x0) [ 494.739218][T19776] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 494.747206][T19776] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f108cb0b6d4 [ 494.755186][T19776] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:37 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = gettid() r1 = socket$kcm(0x11, 0x10000000003, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(r1, &(0x7f00000029c0)={&(0x7f0000000640)=@pppoe={0x18, 0x0, {0x4, @local, 'sit0\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000006c0)="c35cac0b93783b6c7723bb3c2571fc6908c1ecfa87d68efe4280d2742d73e1825815ec043e92ff834186e301b89481fa2a2d0a2ff4abded817814daa794d7746f80084ebae37bbbcaf009c710229573f4345af9bb135c335be2126c99380da53d938503551552ce28c111104d78871a26eab097cbd43908381f601176f57d1ff3db35034f935ea9ec9b02222ccb82f3eeda0ce36a4b447719473f2effae38d63e7c87dcf8b12f2375f7874a2479cbba6dc727f6209a157699ddbda9c6f70b61e0c0b592c3acd07fc7768856bf5401d1d27a811e499c383131199c8196c3dc2b77b3b21b0595f248a98379fc47a", 0xed}, {&(0x7f00000007c0)="cb4a15b2c0ed3e79332fc5de070f9796ba837f29e4fdee115515189f21874dbf2f", 0x21}, {&(0x7f0000000800)="2735b07c21ac20b2c1c0621f87", 0xd}, {&(0x7f0000000840)="3a6eeab559a7a6e5b8b8edd314fb970c32715bb9a829ae4de1daccbcc39310c97ef8a24fc9b8bca2e24643dfadb2fe7350099cc62ee4fdd4d3cab3b69c4f9d0b50db655d2ea7dfda89b6a4cc834ffffd6b36c40ced84b478ad0d2ba41c8ad6a642cef92ad421a3ab619c4c613e18b9431959d39cd90b21e6d698b749e9a690ce0c54acdca2e4ab8b75dff0017fe9a50ffe7149da32ec46f192868f9e94fb66d40090d1bd3b6f5d6c870327fc5bb2f14589015eb6d27044ddff4536abcfe5d0fef790be45c32c9856af1e07b1183939bdbf36c252a83fc08c83123006add92e3d4d21a1918b8dff8be1264b57", 0xec}], 0x4, &(0x7f0000000980)=[{0x1010, 0x111, 0x101, "c2f88a7b34840e5ed614dabfccf06f755c457f57b98106cd27b04249087f54a914f9cff880cabe06707bd9aea062b461f2c28f083613ee47bf98121d229334073c59bd92eb8b7513eae9202345d033bb78884924e2dedaa8de001c0d4d6a39fce16f533d8f6bba0692d1856d0c2f0755d126b9ca5120a611ac21cb1df9d8e24562c203677bd416829d757d23102ed8fa8f99424203cf896afdc9ae3e0c5033ca3ad01ff7652a54d5eb43f11d790429fe499e782417901453b43d87ccc4580264b0ace7ea7a74a02867f59310962e84234b9d1b75b23e0153b9b51b933a3c82ef7a9608c4cfb16e21cb1ce108283fb90c792d3c38dea48b3f6d662a6ffb98455762638a57c81be61648fc3f4cbfedb23387d4dc233eb89820f79e2d46fc8fa7eab17ef5d8b7de0b9e05c675bd612aa01ff429ab8fe6bf44f236365ae1bd38f96ee471ec74052425445cd83734a56f53636fa666e4c79c0897c00a9ce1e3a8efba682b758393cc94335084e6d4c63a3e4ef8787c86afeb246330411e6647d9ebcbe9e1ef37c3f4706fc968c4ae643db890f761365471179b44679a4a51edc3e475492da4921d692db711dda437f5b11cb61a3acd8a2e2a36425aa0bc9e2aa4a845882044baf211bbe87458e9e86910ba407d69ef00444d10793488db69a94d786dcadc6c28c95e1ba437644191722a3e01d820a50636198ca00e110d748fb8dd4e08df013cc9b062c6aecad3b2722394a10a54a8145926d2b8878cda3e92f699811957d2d3b4fdfd5b4c90f5dd650440bf23ea3bb40f7931b4ddc653f8cf91304ef92367f8b18751d08035c13c07098f02cd016d005da4049c18b35708c9b24e155bf9219b69d6fadfac9ac968d2521d4c00e8832f05999abbe393ceef531ae45247c770fc516ef295df0aefbfc9fb3ade8d79e9254bb23b2f07dc86e7429844f4e9b4f321dfe72a852d87bd8f21217f5dfe93518771f7120bb82deaf1a22eaefd256d785df5e930c813df0dc9cd32fa7a6b41ea96da9823670a4075e3c14c551c0381d16ad55ad0adefb1abeb98824808060c1e6ff853c9186ee6a34ee1a5f579d1f7180b318bef78e4ff2e8678b8b627ec800319ccdd0316043597970b7587454df13f2288f94f39ae1a9d706d161ae51e35cd8511b650b61168232f1ae7f3bb562cae0b667d9bfcd0bfce7b38899da97b355b469d3cc6be37aaa5bdd44d60f1655759351c44ba4d98570017f57be6d5e9371d605301f6f27dd9e1c6f7793dcecbf6c03a0d10389f8259502f19f33ad87cf35757bc956028cb3aebadf7c26a1f5079edef4a70f798083e102b5795fbb39a5099babee87eeb8fc969a13711dce8897317e454052a63909f01b02ce07ca676a1f327481a4c600a324654a2b9fde35c5b79ae8a4a08eccfceeed9207adc4d7d39d54282709e37483a0399af7cf79235ab9f3bd9250bdaf5121d98fffd5b0fb39f82463568cd4a18a09e592b21fe3e47303bf52b88c6786eed1e00a8c5b605ae3cf28370997383c1898446bee583e4c18a5d96e42d5a881a52f9955959e9ccdcfc33e525f21daa0ede345e3315d7a6887d7224f6ff0275890a5d18e069ee6b460d6bb25ceefd41da7396920d8ffcff2dbc0bd15d515d438273b746ca383961b807abd0b43ec41666d55220c1494133fce3eb08df0d65e05e8c76f3b687c53720bd7a4b934f0d0f4c6046dadea5ab57adbceb0290b8c72a8559323bf3545dddd00ca31c7eefc10ef65f8e55ca1132c36ee79d44963aaf2b6af9f10f50dc988a5c4581c560c67a10c955b53171646fc602705bb529adf6ccbf06c925ba2edaf52586331033eb31c308e004c0c7aefb817c2bfc782f6631e12925696c8b259b6a8032c7158e4eefd0b8e4d0e04cfee1ba8680a7c7de414663356d751cc806ee8af1e0fa55e9ad45c96ebea1db3b4ed2bbc3f4076570156a02aa3d65ad17ea3cc3268b963f02fa1507ab20a2688d68ae3b5c8530f4acab27ab5c77e303a828741b35fa421d87ae076eaba5a2d12ebef48f8e6712124d503b95d535518aa95ff2bd6957298945a6cb9c8b034a4b4016792a8f7af3968f4e9ca6674c773c55c47a958fca1c3f0487aa450466202ab5312329d49147b02db68f4367478ea74804e9aeb6c63e5adaf7637b6656a7e9d2bafce9044a35cb36575f824fda810cc66d1809169b2b199da898869629a70136971663693d6b88165e4ec1630a9130a043547122705344927cc63b1370790b258908f7c5fae05260963bbf9fa7bdf15a294b5ff45bc22a387d788f9d38062599c0982335901cd47bf4883bdb8c56a0d8965d865a453b3dcd3e5f83a2489790ce152884f46181c1c7c87284f4ca204a2d446d5d784e09a18d1f2ee935e0bea1e92c0c36a69290274ae23622c1a53afb2a178ad18bc14d38056bfa49740993859f81057b3adb7c2088481b54a7e81b2ab52e81bf38fb2c4f848d907619fdde85cc52c4a7529a9c7a9062ca2cb8bbadea63ee92db307f61fceff2ccf519ba684ff18a38e592a2cf1d6740d7c107dc495d7097f21ca77f96c91a4367abe396b45fb271c5c5c6029ebcd265d31ddfc8659b569474e6700d5ae977d76d4521f25f5b41d307c358c0b5ea7f42a831350480cae8be14653d47bf4118dba7041554d82f55c9ef4dcf4f11ecd72e4a3896665dc15373b6beaa69a14fc0adb8901cdf4c1d4ed417dab257bd6ba3fe1f89a80cb522b6697fa8b6bc770f10b7992a68c5ab6d490ffef3dd2016e7e2d4826356abfd87a7d7b6fe16a1e87ad58faba4e06280764afdd24ec69226bd4d706ea587dab6aa6fdc442b07d11b7e1b9e4fc7744951a992636ade4469efd9faac38eceefc0187ad406df9a194b7242898d176d25a8ddba9577d20434292af4c2b88a12b6a4412aee448a13dbb2b14c333dd63c551288a74e9c282979a152617b7e9cef75ad309242c065490e341a3437daad88400f31acc79bd4877b7be87a0061bd58caf9aa7602b82bd89971a8fe1e2bd0e87dcee5285e4a718b07212f598785ef6de96619e9d6ed306e9fa69ae956fb5e0613e6794596ad620fc16f1b7ae0e6e1c9aad10ed61a3463a4b069c50e8693933f92218daacbf6145a2960ed8a64b7738d126b60696956ef24fa04a4e655b631f9c5dd0964740fbec8f3275646f5dcb87313703590da8842d9301d0f4fcadf310ed1e6b85c09860398d8893e2478e22439195947fed00c1e32c4d0a7cf829956ecdad9debb3ba77138c32bc01065fba931b0d56b7f2332909e2907b971b4774fcabbef0e393b460827db9dcb45cdf88844ce07cddb9f6a8fa7dc4e99ab3a82d02ccd6e09f5be9d358ef2c5dd2050eaa639431ea56095f55edc8d9b3ad7a6cfc348ff5ff8b329911146058b581cfb9a3c5ebd1395ee977014e97463c2d380023418c92f6131063339a0887b63c14698d95a9c6d9bd28cd51462d5600688e1b54900ef90951c168679ffa00f11b92909b6e3879ec0099c0249e8c62d827b34d4f8c8ca9560ccf86e23e42618d217daf93fa86fa1f240afeffa6553082351128eee7677d54522d24823784516d73f21b379b1ca24121ee404016f50598a39ae0b88b093c02dd8eecf49f034235ec517b8dec19ca3445c36ab98db575ad9191b2049bf69b83a0b5c581ef9c094ec90789ecfcd762695fc0d8e067549838f752aba6fcce9d890f4123d4ed646d9de446eb941cfecd5d8de0c9e375eda750856ad7847cbd210c94ae867f98305a8800d8020e279fd307ae707a3b4ed08c6c78b5ac1c6816135bae47acf998e9ad6c54e422ce1b9c5f9c1b4017b8c37d4a2afab9be4111959de1a637e616c9feebdea06faaf0e13fa8a1697c4326f036158fd2fe509e234b26cc71e540d8d5119f57709f12432e23ee48f47aa38ccb39ac0f23913290f538ee8e788ee01efbbc46e8304480448894776bb5f6745fcd3d20a255dd2c4e31be357dede05086e3ad03dd3eef11188ab2bf429973fddf44404d919b47b49b2949e9617c86be5748c02ad91dee5c3935d2f9f4904939f315f16cfd4a76fb99da1a42e82af720116df0e77b7f8574ef3892621c770f0206013b6eea950ddb5a62c99cb9114857dc6fa8a9a957e5256a9f8914d8ffc7d7906129abf1a3484dfebae68fb79b63d0fdb808ad40c9583d31694993f014a4efa6775cd3471ffc12249bf17cfef704136fa7efda1c30096321d54280f3ea068cd3dea2b299580c6cde7fd63f33d4038e588649eb965f8ba2158af48584b6e8e78f701b4dcc9071c253d0c119025857ad3e9453f0e8238c1ec739bc12acb746e0274c52bcaf764b981053829dc82c1e5d1359ce2e3c35e6789b86aaaa3617ad05ee1246852b918c3f9da53408cc121f553b21a5cd6f0e4adbae2123680d6b7a8564ac79425fea45dd44a0b2274c22b5cb7077675edfef66ae97b67d5c63d76a38360773888a16603e00f8759440ab6403a20a44715b3b119ac7732dfee27c7b01e491e5553a3a09e9c0603b0cb58dc449c62c6a7874f92c344ad51d50ef77734337515141a49275ff39ff06d3a2323779dd0be4fab78d0b912e23694e09dec1e7895d4f406086078de0dff64f14a271852503392ab2725a1b937d52ddeea34e3edd2812b6644b0ca80b2c9d4f33cb62e280791e88a1b0b240deef2f5d35426f0f71bbde7deba1e2cd2f5cd69db9e39d5ca92637305d1f203b7950fb2307456f444d4a6e5e013a85849be6ad771b1b5886da00b29df6caa3cf6dc0947dfd46b6ab2175cdb5f00041dad0e710b1e19c4c988121f36173a46a8a65d8171edd42961499ae9809b4bd1cb5df55ebfb494427f01ce40b51c77a2778c9b2b8b82db3a84347e258d50ca3f0acc4115c8e7a693ad249a4bcbe732997431e935a2f9cfec7b75fb89968c2ebf4c60e6418057ae69785b12839cdc12a076438cc62234bb1343e7b1879ce8fc56965f3f8c0226051369d573107f89745ab712d69f3cf4edc7a01e74eaf2bcefac059d57a0d097851744cf7e5d5537fbd893d1154bf8e63d8bb0959dd4c65a89dc3d7dbcf6b2e553956dfb76195faadf40504a372ddca87bf70703b4cd8d1896a8bffbb4f8f2ff70ad3c7ca973605bd8ddc9a0f906b312d0403e7f7f64e7e2d678df7a02eda96d554f4f43f7565b5d97d1e08148cf9bc69287c74e4d4dea3d8be3c7adee876e04afba0a96e67dcd43f9a36b73c8aff2112f7491503626936e253b9c51efebb84cb4c09e465edb0c7e4567e9fcee77a6afaf4ef9f7fc2e71ca9b906dce3d1baa75151ca372fc616795729998b7c8cc17bdce41fce8c24b0c4e32169075dad61a3ceafb5d749bf89d50aa16030d921f6a39edb531a2f3c874133a12e6cd26876a85d1325402e52c62425fb2f0a2ff2cafc81ec94ab9e49267ae5f4bcc33d182861c09b5198143ed703f3b42ff1fa441e750d1621df3c06a1f681b481e5e39ac1f16cf945957475778b43e3851e7d0d2d7ed34649b0f0dd4d9a51ca35e7c6acdf9efc8fe78361157eef2fe0a76be6cf8b0fd8456465af1ef25057bb4b4e65eb29b2a00684269a1c043bc2f9fab6cad90b7d25b93feef4ddc5de0ec41fd19de9011b3d6a7d2415b5005f0186232686b27bb8ca81f82b5932a2a1c725314f86de995b07468d71c073245ac013446cb4fbef97eae86663e5c7d0cb3674de79e068870bc003d53cb29875783e0b9a33ba15658e5677f2fdb9a1959578fa4d244236af710cd9ae9dbfecfafb6bcae44dff2c9813a624ca85f9c7ba890f1ac13e6f47f844e2187146d3d7"}, {0x10, 0x113, 0x80}, {0x1010, 0x3a, 0x2, "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"}], 0x2030}, 0x24058) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xe7, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10}, r0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)='/@[\x00'}, 0x30) r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x6, 0xff, 0x0, 0xc1, 0x0, 0x7, 0x80415, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffff001, 0x5d775bbb31047fe6, @perf_config_ext={0x9, 0x3}, 0x840, 0xffffffffffffffff, 0x4, 0x5, 0x6, 0x0, 0x3f}, 0x0, 0x8, 0xffffffffffffffff, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x6, 0x3}, 0x0, 0x0, &(0x7f0000000440)={0x0, 0xb, 0x101}, &(0x7f0000000480)=0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0xcde6000}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r2, r3, 0x0, 0x2, &(0x7f0000000380)=']\x00', r4}, 0x30) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d) recvmsg(r6, &(0x7f0000000100)={&(0x7f0000000180)=@xdp, 0x80, &(0x7f0000000080)=[{&(0x7f0000000200)=""/119, 0x77}], 0x1}, 0x40) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000040)='/@[\x00') 19:55:37 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0402b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:37 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0500b0eb04001800160011000586f9835b3f2f009148790000f85acc", 0x2c}], 0x1}, 0x0) 19:55:37 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb02001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 495.057036][T19788] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 495.084626][T19788] CPU: 1 PID: 19788 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 495.092552][T19788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.102621][T19788] Call Trace: [ 495.105929][T19788] dump_stack+0x172/0x1f0 [ 495.110275][T19788] sysfs_warn_dup.cold+0x1c/0x31 [ 495.115231][T19788] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 495.121309][T19788] sysfs_create_link+0x65/0xc0 [ 495.126092][T19788] device_add+0x75c/0x17a0 [ 495.130515][T19788] ? mark_lock+0xc2/0x1220 [ 495.134939][T19788] ? uevent_show+0x370/0x370 [ 495.139533][T19788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 495.145799][T19788] wiphy_register+0x1c46/0x2720 [ 495.150665][T19788] ? wiphy_unregister+0x1040/0x1040 [ 495.155872][T19788] ? __kmalloc+0x608/0x770 [ 495.160294][T19788] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 495.166113][T19788] ? lockdep_hardirqs_on+0x421/0x5e0 [ 495.171413][T19788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 495.177667][T19788] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 495.183314][T19788] ieee80211_register_hw+0x157e/0x3ac0 [ 495.188799][T19788] ? ieee80211_ifa_changed+0xde0/0xde0 [ 495.194269][T19788] ? memset+0x32/0x40 [ 495.198255][T19788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 495.204502][T19788] ? __hrtimer_init+0x13d/0x280 [ 495.209374][T19788] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 495.215122][T19788] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 495.221549][T19788] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 495.227454][T19788] hwsim_new_radio_nl+0x9e3/0x1070 [ 495.232583][T19788] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 495.238485][T19788] ? nla_memcpy+0xb0/0xb0 [ 495.242831][T19788] ? __nla_parse+0x43/0x60 [ 495.247253][T19788] genl_family_rcv_msg+0x74b/0xf90 [ 495.252367][T19788] ? genl_unregister_family+0x7b0/0x7b0 [ 495.252384][T19788] ? __kasan_check_read+0x11/0x20 [ 495.252399][T19788] ? __lock_acquire+0x16f2/0x4a00 [ 495.252413][T19788] ? __dev_queue_xmit+0xbb5/0x3720 [ 495.252445][T19788] genl_rcv_msg+0xca/0x170 [ 495.252463][T19788] netlink_rcv_skb+0x177/0x450 [ 495.263000][T19788] ? genl_family_rcv_msg+0xf90/0xf90 [ 495.263019][T19788] ? netlink_ack+0xb50/0xb50 [ 495.263033][T19788] ? __kasan_check_write+0x14/0x20 [ 495.263053][T19788] ? netlink_deliver_tap+0x254/0xbf0 [ 495.263073][T19788] genl_rcv+0x29/0x40 [ 495.263087][T19788] netlink_unicast+0x531/0x710 [ 495.263107][T19788] ? netlink_attachskb+0x7c0/0x7c0 [ 495.263122][T19788] ? _copy_from_iter_full+0x25d/0x8c0 [ 495.263139][T19788] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 495.263158][T19788] ? __check_object_size+0x3d/0x437 [ 495.332637][T19788] netlink_sendmsg+0x8a5/0xd60 [ 495.337417][T19788] ? netlink_unicast+0x710/0x710 [ 495.342361][T19788] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 495.347921][T19788] ? apparmor_socket_sendmsg+0x2a/0x30 [ 495.353417][T19788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 495.359661][T19788] ? security_socket_sendmsg+0x8d/0xc0 [ 495.365120][T19788] ? netlink_unicast+0x710/0x710 [ 495.370061][T19788] sock_sendmsg+0xd7/0x130 [ 495.374477][T19788] ___sys_sendmsg+0x803/0x920 [ 495.379157][T19788] ? copy_msghdr_from_user+0x440/0x440 [ 495.384629][T19788] ? __kasan_check_read+0x11/0x20 [ 495.389664][T19788] ? __fget+0x384/0x560 [ 495.393828][T19788] ? ksys_dup3+0x3e0/0x3e0 [ 495.398254][T19788] ? __fget_light+0x1a9/0x230 [ 495.402930][T19788] ? __fdget+0x1b/0x20 [ 495.406999][T19788] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 495.413339][T19788] __sys_sendmsg+0x105/0x1d0 [ 495.417945][T19788] ? __sys_sendmsg_sock+0xd0/0xd0 [ 495.423000][T19788] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 495.428476][T19788] ? do_syscall_64+0x26/0x760 [ 495.433166][T19788] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.439245][T19788] ? do_syscall_64+0x26/0x760 [ 495.443939][T19788] __x64_sys_sendmsg+0x78/0xb0 [ 495.448717][T19788] do_syscall_64+0xfa/0x760 [ 495.453232][T19788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.459129][T19788] RIP: 0033:0x459a59 [ 495.463030][T19788] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 495.482636][T19788] RSP: 002b:00007f4bf17e3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 495.491055][T19788] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 495.499040][T19788] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 19:55:37 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:37 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 495.507022][T19788] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 495.515003][T19788] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf17e46d4 [ 495.522982][T19788] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:38 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0500b0eb04001800160011000586f9835b3f2f009148790000f85acc", 0x2c}], 0x1}, 0x0) [ 495.802209][T19800] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 19:55:38 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0403b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 495.914453][T19797] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 19:55:38 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000200)={'ip6tnl0\x00'}) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r5, &(0x7f00000000c0), 0x12) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r6, 0x0, 0x5}, 0x3c) openat$cgroup_type(r6, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r6, 0x0) openat$cgroup_int(r6, &(0x7f0000000240)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) r7 = socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f0000000040)=r3, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) r8 = openat$cgroup_ro(r3, &(0x7f0000000580)='c.eff%\x03\x00\x00\x00\x00\x00\x00\x00U%\xb7L\xffect\xcf]$6g|\xce\xa5\xfa_\x9b9.\xf5%\xb8\xac)\xce\x92\xa0\\\\\xebt#\x1e\a\xf5\xbf{\xbb&|\x9fp\x00\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00\xfe\x01\x9247\xee!*\xaa\x8dF\x9e|\xd4\xe1qc\xd5\xf7\x1a\x87.>\xb6NuG\xb2(sF\x95\xd5?\xf5\xd5\x1a\xf7)\xd7j\xad\xf9g\xa4\xb8\xc9\xf9\xeb\x8c\xc73\xa5\n\xc9\x04\xbc\x1d\xc5\xc1\x00n\xa3y\x89\xc1\x03\x93\xe5w\xbeu\xdf<\x14\xda\xd8\xa5\x93\x89=\x90=\xe9\x12\xb3\xa9\xc0g\xc6Oi\xc0 \\\x10\x8cp\x90#\xc4w\x7f\xc1Ctw\xe6*R\xf8\xf9\x0ep\xb5\xfa\xb0\x88 \xc5t`\xde\vvx\x1b\x17Br\x87E\xc0y\x01tS\f\ae\xec\n\xba!K\x97\xac#(IXz\xcfd49\xe7\xe2\xc1\x8b}\xa5\x85Q\x04\x7fQ\x8a\xe5\xda\x8a\xf0]\xc1\xa4\xb2\xd9h\xd3\xb2d\xb8\x98O%\xc6\xfa\'#\x9a$yG\xb0=\x83\x00i#\x12$J\f\x147\x88\x1c\a\xbd\xc0\xf8\xbec\x8a1\xe4\xff\xc3\xb9Bfz\xf5\xf2\xf9\xe1o\xc9\xc7\x88R\xaf\xd0\x15\xddK\xb2\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00~r\xe5\x9a\x84\x04\x89\xe4\xf3*\x16E\xceFR\xcdYm&\f0/\xc3\x80\x0e7\f\x8c\xfb_', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r9 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r9, 0xffffffffffffffff, 0x0, 0x55, &(0x7f0000000200)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B'}, 0x30) r10 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r10, 0x10, &(0x7f00000005c0)={&(0x7f0000000540)=""/80, 0x50, 0xffffffffffffffff}}, 0x1b5) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x14, &(0x7f0000000ac0)=ANY=[@ANYBLOB="b702000003000002bfa30000000000000703000000feffff7a0af0fff8ffffff79a4ff0048d267df060000fffffffb41ce4f000000000065040400010000000000000000006a0a00fe00000000850000871cd52d6f43ad37900ea30647df659e3c2ea7e5b70137453072080eb0d767cd0800000038f9fdfa6e69e7285800000000000000000000eaffffffffff070000000000620ed03954675eb3d05aeb0c7008395eba0dbf486744ef66061e2294dbbc9a27cd16869ef83161e32da77236174bbf00d5d26dd00ba6582c69af70a46dde5f674b67500f287d0075353c9d11f302a5f32e8e850f11ec3fb7538045327b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r10, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000026c0)={r10}) perf_event_open(&(0x7f0000000a40)={0x5, 0x70, 0xfd, 0x40, 0x1, 0x89, 0x0, 0x1, 0xc010, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x865173e240c3f3b3, 0x200, 0x4, 0x8, 0x562, 0x6, 0x2b}, r9, 0xe, r10, 0x8) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r11, &(0x7f00000000c0), 0x12) r12 = openat$cgroup_ro(r11, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r12, 0x0, 0x5}, 0x3c) openat$cgroup_type(r12, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r12, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r13, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r9, r12, 0x0, 0x2, &(0x7f0000000280)=')\x00', r14}, 0x30) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r15, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, r4, 0x0, 0x161, &(0x7f0000000700)='c.eff%\x03\x00\x00\x00\x00\x00\x00\x00U%\xb7L\xffect\xcf]$6g|\xce\xa5\xfa_\x9b9.\xf5%\xb8\xac)\xce\x92\xa0\\\\\xebt#\x1e\a\xf5\xbf{\xbb&|\x9fp\x00\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00\xfe\x01\x9247\xee!*\xaa\x8dF\x9e|\xd4\xe1qc\xd5\xf7\x1a\x87.>\xb6NuG\xb2(sF\x95\xd5?\xf5\xd5\x1a\xf7)\xd7j\xad\xf9g\xa4\xb8\xc9\xf9\xeb\x8c\xc73\xa5\n\xc9\x04\xbc\x1d\xc5\xc1\x00n\xa3y\x89\xc1\x03\x93\xe5w\xbeu\xdf<\x14\xda\xd8\xa5\x93\x89=\x90=\xe9\x12\xb3\xa9\xc0g\xc6Oi\xc0 \\\x10\x8cp\x90#\xc4w\x7f\xc1Ctw\xe6*R\xf8\xf9\x0ep\xb5\xfa\xb0\x88 \xc5t`\xde\vvx\x1b\x17Br\x87E\xc0y\x01tS\f\ae\xec\n\xba!K\x97\xac#(IXz\xcfd49\xe7\xe2\xc1\x8b}\xa5\x85Q\x04\x7fQ\x8a\xe5\xda\x8a\xf0]\xc1\xa4\xb2\xd9h\xd3\xb2d\xb8\x98O%\xc6\xfa\'#\x9a$yG\xb0=\x83\x00i#\x12$J\f\x147\x88\x1c\a\xbd\xc0\xf8\xbec\x8a1\xe4\xff\xc3\xb9Bfz\xf5\xf2\xf9\xe1o\xc9\xc7\x88R\xaf\xd0\x15\xddK\xb2\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00~r\xe5\x9a\x84\x04\x89\xe4\xf3*\x16E\xceFR\xcdYm&\f0/\xc3\x80\x0e7\f\x8c\xfb_', r16}, 0x30) write$cgroup_pid(r8, &(0x7f00000003c0)=r17, 0xfffffec1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.usage_user\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 496.056355][T19817] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 496.125180][T19817] CPU: 0 PID: 19817 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 496.133148][T19817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.143217][T19817] Call Trace: [ 496.146530][T19817] dump_stack+0x172/0x1f0 [ 496.150972][T19817] sysfs_warn_dup.cold+0x1c/0x31 [ 496.155929][T19817] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 496.162022][T19817] sysfs_create_link+0x65/0xc0 [ 496.166797][T19817] device_add+0x75c/0x17a0 [ 496.171242][T19817] ? mark_lock+0xc2/0x1220 [ 496.175669][T19817] ? uevent_show+0x370/0x370 [ 496.180274][T19817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 496.186530][T19817] wiphy_register+0x1c46/0x2720 [ 496.191399][T19817] ? wiphy_unregister+0x1040/0x1040 [ 496.196617][T19817] ? __kmalloc+0x608/0x770 [ 496.201035][T19817] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 496.206846][T19817] ? lockdep_hardirqs_on+0x421/0x5e0 [ 496.212140][T19817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 496.218386][T19817] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 496.224035][T19817] ieee80211_register_hw+0x157e/0x3ac0 [ 496.229524][T19817] ? ieee80211_ifa_changed+0xde0/0xde0 [ 496.234990][T19817] ? memset+0x32/0x40 [ 496.238999][T19817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 496.245253][T19817] ? __hrtimer_init+0x13d/0x280 [ 496.250137][T19817] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 496.255860][T19817] ? __kasan_check_read+0x11/0x20 [ 496.260906][T19817] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 496.267335][T19817] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 496.273258][T19817] hwsim_new_radio_nl+0x9e3/0x1070 [ 496.278381][T19817] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 496.284303][T19817] ? nla_memcpy+0xb0/0xb0 [ 496.288654][T19817] ? __nla_parse+0x43/0x60 [ 496.293102][T19817] genl_family_rcv_msg+0x74b/0xf90 [ 496.298237][T19817] ? genl_unregister_family+0x7b0/0x7b0 [ 496.303788][T19817] ? __kasan_check_read+0x11/0x20 [ 496.308820][T19817] ? __lock_acquire+0x16f2/0x4a00 [ 496.313857][T19817] ? __dev_queue_xmit+0xbb5/0x3720 [ 496.318998][T19817] genl_rcv_msg+0xca/0x170 [ 496.323424][T19817] netlink_rcv_skb+0x177/0x450 [ 496.328203][T19817] ? genl_family_rcv_msg+0xf90/0xf90 [ 496.333498][T19817] ? netlink_ack+0xb50/0xb50 [ 496.338091][T19817] ? __kasan_check_write+0x14/0x20 [ 496.343215][T19817] ? netlink_deliver_tap+0x254/0xbf0 [ 496.348512][T19817] genl_rcv+0x29/0x40 [ 496.352499][T19817] netlink_unicast+0x531/0x710 [ 496.357272][T19817] ? netlink_attachskb+0x7c0/0x7c0 [ 496.362918][T19817] ? _copy_from_iter_full+0x25d/0x8c0 [ 496.368299][T19817] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 496.374026][T19817] ? __check_object_size+0x3d/0x437 [ 496.379238][T19817] netlink_sendmsg+0x8a5/0xd60 [ 496.384013][T19817] ? netlink_unicast+0x710/0x710 [ 496.388954][T19817] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 496.394518][T19817] ? apparmor_socket_sendmsg+0x2a/0x30 [ 496.399968][T19817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 496.406194][T19817] ? security_socket_sendmsg+0x8d/0xc0 [ 496.411646][T19817] ? netlink_unicast+0x710/0x710 [ 496.416570][T19817] sock_sendmsg+0xd7/0x130 [ 496.420971][T19817] ___sys_sendmsg+0x803/0x920 [ 496.425637][T19817] ? copy_msghdr_from_user+0x440/0x440 [ 496.431088][T19817] ? __kasan_check_read+0x11/0x20 [ 496.436099][T19817] ? __fget+0x384/0x560 [ 496.440252][T19817] ? ksys_dup3+0x3e0/0x3e0 [ 496.444658][T19817] ? __fget_light+0x1a9/0x230 [ 496.449327][T19817] ? __fdget+0x1b/0x20 [ 496.453389][T19817] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 496.459614][T19817] __sys_sendmsg+0x105/0x1d0 [ 496.464193][T19817] ? __sys_sendmsg_sock+0xd0/0xd0 [ 496.469223][T19817] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 496.474663][T19817] ? do_syscall_64+0x26/0x760 [ 496.479329][T19817] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.485376][T19817] ? do_syscall_64+0x26/0x760 [ 496.490045][T19817] __x64_sys_sendmsg+0x78/0xb0 [ 496.494798][T19817] do_syscall_64+0xfa/0x760 [ 496.499296][T19817] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.505182][T19817] RIP: 0033:0x459a59 19:55:38 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0500b0eb04001800160011000586f9835b3f2f009148790000f85acc", 0x2c}], 0x1}, 0x0) [ 496.509061][T19817] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 496.528650][T19817] RSP: 002b:00007f4bf17e3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 496.537061][T19817] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 496.545016][T19817] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 496.552969][T19817] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 496.560922][T19817] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf17e46d4 [ 496.568880][T19817] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:38 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb03001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:39 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0500b0eb04001800160011000586f9835b3f2f009148790000f85acc7c", 0x2d}], 0x1}, 0x0) [ 496.734035][T19831] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 19:55:39 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0404b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:39 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:39 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 496.871656][T19831] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 19:55:39 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) recvmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/103, 0x67}], 0x1, &(0x7f0000000180)=""/32, 0x20}, 0x40000000) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x99, 0xff, 0x20, 0x0, 0x8, 0x61, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffefe00, 0x1, @perf_config_ext={0x7fffffff, 0x8}, 0x8, 0x77, 0x6, 0x5, 0xfffffffffffffffa, 0x1f, 0x2}, 0x0, 0x3, r2, 0x2) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r4, 0x0, 0x5}, 0x3c) openat$cgroup_type(r4, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) r5 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r5, 0xffffffffffffffff, 0x0, 0x55, &(0x7f0000000200)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B'}, 0x30) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(r6, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r7, 0x10, &(0x7f00000005c0)={&(0x7f0000000540)=""/80, 0x50, 0xffffffffffffffff}}, 0x1b5) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x14, &(0x7f0000000ac0)=ANY=[@ANYBLOB="b702000003000002bfa30000000000800703000000feffff7a0af0fff8ffffff79a4ff0048d267df060000fffffffb41ce4f000000000065040400010000000000000000006a0a00fe00000000850000871cd52d6f43ad37900ea30647df659e3c2ea7e5b70137453072080eb0d767cd0800000038f9fdfa6e69e7285800000000000000000000eaffffffffff070000000000620ed03954675eb3d05aeb0c7008395eba0dbf486744ef66061e2294dbbc9a27cd16869ef83161e32c69af70a46dde5f674b67500f287d0075353c9d11f302a5f32e8e850f11ec3fb7578045327b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000026c0)={r7}) perf_event_open(&(0x7f0000000a40)={0x5, 0x70, 0xfd, 0x40, 0x1, 0x89, 0x0, 0x1, 0xc010, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x865173e240c3f3b3, 0x200, 0x4, 0x8, 0x562, 0x6, 0x2b}, r5, 0xe, r7, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r5, r2, 0x0, 0xe, &(0x7f0000000280)='memory.events\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x2a, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x8, 0x0, 0x8, 0x4, 0x5, 0x7}, 0x0, 0x0, r8, 0x0) openat$cgroup_ro(r4, &(0x7f0000000140)='mem\x01\x00\x00\x00\x01\xa6\xd2\xe2\xf92\xfc', 0x7a05, 0x1700) 19:55:39 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0500b0eb04001800160011000586f9835b3f2f009148790000f85acc7c", 0x2d}], 0x1}, 0x0) [ 497.044802][T19840] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 497.083017][T19840] CPU: 0 PID: 19840 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 497.090958][T19840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.101228][T19840] Call Trace: [ 497.104538][T19840] dump_stack+0x172/0x1f0 [ 497.108897][T19840] sysfs_warn_dup.cold+0x1c/0x31 [ 497.113860][T19840] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 497.119951][T19840] sysfs_create_link+0x65/0xc0 [ 497.124733][T19840] device_add+0x75c/0x17a0 [ 497.129143][T19840] ? mark_lock+0xc2/0x1220 [ 497.133553][T19840] ? uevent_show+0x370/0x370 [ 497.133568][T19840] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 497.133590][T19840] wiphy_register+0x1c46/0x2720 [ 497.133613][T19840] ? wiphy_unregister+0x1040/0x1040 [ 497.133637][T19840] ? __kmalloc+0x608/0x770 [ 497.158865][T19840] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 497.164691][T19840] ? lockdep_hardirqs_on+0x421/0x5e0 [ 497.169991][T19840] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 497.176248][T19840] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 497.181902][T19840] ieee80211_register_hw+0x157e/0x3ac0 [ 497.187384][T19840] ? ieee80211_ifa_changed+0xde0/0xde0 [ 497.192862][T19840] ? memset+0x32/0x40 [ 497.196848][T19840] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 497.203087][T19840] ? __hrtimer_init+0x13d/0x280 [ 497.207948][T19840] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 497.213664][T19840] ? __kasan_check_read+0x11/0x20 [ 497.218702][T19840] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 497.225121][T19840] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 497.231019][T19840] hwsim_new_radio_nl+0x9e3/0x1070 [ 497.236133][T19840] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 497.242031][T19840] ? nla_memcpy+0xb0/0xb0 [ 497.246372][T19840] ? __nla_parse+0x43/0x60 [ 497.254272][T19840] genl_family_rcv_msg+0x74b/0xf90 [ 497.259828][T19840] ? genl_unregister_family+0x7b0/0x7b0 [ 497.265979][T19840] ? __kasan_check_read+0x11/0x20 [ 497.271003][T19840] ? __lock_acquire+0x16f2/0x4a00 [ 497.276023][T19840] ? __dev_queue_xmit+0xbb5/0x3720 [ 497.281176][T19840] genl_rcv_msg+0xca/0x170 [ 497.285621][T19840] netlink_rcv_skb+0x177/0x450 [ 497.290732][T19840] ? genl_family_rcv_msg+0xf90/0xf90 [ 497.296019][T19840] ? netlink_ack+0xb50/0xb50 [ 497.300607][T19840] ? __kasan_check_write+0x14/0x20 [ 497.305809][T19840] ? netlink_deliver_tap+0x254/0xbf0 [ 497.311102][T19840] genl_rcv+0x29/0x40 [ 497.315177][T19840] netlink_unicast+0x531/0x710 [ 497.319956][T19840] ? netlink_attachskb+0x7c0/0x7c0 [ 497.325065][T19840] ? _copy_from_iter_full+0x25d/0x8c0 [ 497.330439][T19840] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 497.336169][T19840] ? __check_object_size+0x3d/0x437 [ 497.341378][T19840] netlink_sendmsg+0x8a5/0xd60 [ 497.346149][T19840] ? netlink_unicast+0x710/0x710 [ 497.351089][T19840] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 497.356636][T19840] ? apparmor_socket_sendmsg+0x2a/0x30 [ 497.362096][T19840] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 497.368333][T19840] ? security_socket_sendmsg+0x8d/0xc0 [ 497.373790][T19840] ? netlink_unicast+0x710/0x710 [ 497.378728][T19840] sock_sendmsg+0xd7/0x130 [ 497.383166][T19840] ___sys_sendmsg+0x803/0x920 [ 497.387850][T19840] ? copy_msghdr_from_user+0x440/0x440 [ 497.393316][T19840] ? __kasan_check_read+0x11/0x20 [ 497.398345][T19840] ? __fget+0x384/0x560 [ 497.402506][T19840] ? ksys_dup3+0x3e0/0x3e0 [ 497.406927][T19840] ? __fget_light+0x1a9/0x230 [ 497.411604][T19840] ? __fdget+0x1b/0x20 [ 497.415680][T19840] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 497.421927][T19840] __sys_sendmsg+0x105/0x1d0 [ 497.426520][T19840] ? __sys_sendmsg_sock+0xd0/0xd0 [ 497.431558][T19840] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 497.437013][T19840] ? do_syscall_64+0x26/0x760 [ 497.441689][T19840] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 497.447749][T19840] ? do_syscall_64+0x26/0x760 [ 497.452428][T19840] __x64_sys_sendmsg+0x78/0xb0 [ 497.457197][T19840] do_syscall_64+0xfa/0x760 [ 497.461706][T19840] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 497.469941][T19840] RIP: 0033:0x459a59 [ 497.473853][T19840] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:55:39 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb05001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 497.493461][T19840] RSP: 002b:00007f4bf17e3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 497.501875][T19840] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 497.509845][T19840] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 497.517828][T19840] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 497.525800][T19840] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf17e46d4 [ 497.533772][T19840] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff [ 497.622960][T19859] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.2'. 19:55:40 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0405b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:40 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0500b0eb04001800160011000586f9835b3f2f009148790000f85acc7c", 0x2d}], 0x1}, 0x0) 19:55:40 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb06001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 497.881502][T19870] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 497.921181][T19870] CPU: 0 PID: 19870 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 497.929134][T19870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.939207][T19870] Call Trace: [ 497.942537][T19870] dump_stack+0x172/0x1f0 [ 497.946893][T19870] sysfs_warn_dup.cold+0x1c/0x31 [ 497.951848][T19870] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 497.957927][T19870] sysfs_create_link+0x65/0xc0 [ 497.962702][T19870] device_add+0x75c/0x17a0 [ 497.967118][T19870] ? mark_lock+0xc2/0x1220 [ 497.971537][T19870] ? uevent_show+0x370/0x370 [ 497.976144][T19870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 497.982405][T19870] wiphy_register+0x1c46/0x2720 [ 497.987278][T19870] ? wiphy_unregister+0x1040/0x1040 [ 497.992487][T19870] ? __kmalloc+0x608/0x770 [ 497.996902][T19870] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 498.002705][T19870] ? lockdep_hardirqs_on+0x421/0x5e0 [ 498.007996][T19870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 498.014243][T19870] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 498.019892][T19870] ieee80211_register_hw+0x157e/0x3ac0 [ 498.025369][T19870] ? ieee80211_ifa_changed+0xde0/0xde0 [ 498.030839][T19870] ? memset+0x32/0x40 [ 498.034839][T19870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 498.041081][T19870] ? __hrtimer_init+0x13d/0x280 [ 498.045950][T19870] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 498.051691][T19870] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 498.058128][T19870] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 498.064039][T19870] hwsim_new_radio_nl+0x9e3/0x1070 [ 498.069165][T19870] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 498.075072][T19870] ? nla_memcpy+0xb0/0xb0 [ 498.079418][T19870] ? __nla_parse+0x43/0x60 [ 498.083849][T19870] genl_family_rcv_msg+0x74b/0xf90 [ 498.088985][T19870] ? genl_unregister_family+0x7b0/0x7b0 [ 498.094546][T19870] ? __kasan_check_read+0x11/0x20 [ 498.099591][T19870] ? __lock_acquire+0x16f2/0x4a00 [ 498.104623][T19870] ? __dev_queue_xmit+0xbb5/0x3720 [ 498.109763][T19870] genl_rcv_msg+0xca/0x170 [ 498.114216][T19870] netlink_rcv_skb+0x177/0x450 [ 498.118989][T19870] ? genl_family_rcv_msg+0xf90/0xf90 [ 498.124287][T19870] ? netlink_ack+0xb50/0xb50 [ 498.128885][T19870] ? __kasan_check_write+0x14/0x20 [ 498.134014][T19870] ? netlink_deliver_tap+0x254/0xbf0 [ 498.139314][T19870] genl_rcv+0x29/0x40 [ 498.143306][T19870] netlink_unicast+0x531/0x710 [ 498.148088][T19870] ? netlink_attachskb+0x7c0/0x7c0 [ 498.153208][T19870] ? _copy_from_iter_full+0x25d/0x8c0 [ 498.158595][T19870] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 498.164319][T19870] ? __check_object_size+0x3d/0x437 [ 498.169557][T19870] netlink_sendmsg+0x8a5/0xd60 [ 498.174347][T19870] ? netlink_unicast+0x710/0x710 [ 498.179381][T19870] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 498.184939][T19870] ? apparmor_socket_sendmsg+0x2a/0x30 [ 498.190407][T19870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 498.196651][T19870] ? security_socket_sendmsg+0x8d/0xc0 [ 498.202110][T19870] ? netlink_unicast+0x710/0x710 [ 498.207054][T19870] sock_sendmsg+0xd7/0x130 [ 498.211469][T19870] ___sys_sendmsg+0x803/0x920 [ 498.216151][T19870] ? copy_msghdr_from_user+0x440/0x440 [ 498.221615][T19870] ? __kasan_check_read+0x11/0x20 [ 498.226645][T19870] ? __fget+0x384/0x560 [ 498.230806][T19870] ? ksys_dup3+0x3e0/0x3e0 [ 498.235229][T19870] ? __fget_light+0x1a9/0x230 [ 498.239901][T19870] ? __fdget+0x1b/0x20 [ 498.243976][T19870] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 498.250218][T19870] __sys_sendmsg+0x105/0x1d0 [ 498.254806][T19870] ? __sys_sendmsg_sock+0xd0/0xd0 [ 498.259841][T19870] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 498.265296][T19870] ? do_syscall_64+0x26/0x760 [ 498.269975][T19870] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 498.276036][T19870] ? do_syscall_64+0x26/0x760 [ 498.280719][T19870] __x64_sys_sendmsg+0x78/0xb0 [ 498.285486][T19870] do_syscall_64+0xfa/0x760 [ 498.289994][T19870] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 498.295882][T19870] RIP: 0033:0x459a59 [ 498.299778][T19870] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 498.319472][T19870] RSP: 002b:00007f4bf17e3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 498.327907][T19870] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 498.335971][T19870] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 498.343942][T19870] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 498.351911][T19870] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf17e46d4 [ 498.359879][T19870] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff [ 498.410887][T19872] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.2'. 19:55:40 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:40 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:40 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0406b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:40 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:40 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb07001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:41 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = socket$kcm(0x11, 0x200000000000002, 0x300) r4 = socket$kcm(0x11, 0x10000000003, 0x0) setsockopt$sock_attach_bpf(r3, 0x107, 0x12, &(0x7f00000000c0)=r4, 0x4) close(r3) r5 = socket$kcm(0x11, 0x200000000000002, 0x300) r6 = socket$kcm(0x11, 0x10000000003, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0x12, &(0x7f00000000c0)=r6, 0x4) close(r5) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000040)={r5}) sendmsg(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="33b4768ad6d6416c92fd8118c35c4c50e08ada238d7b4b7300ddc3335f7014fa7b00726d3a7fec52931d23917fca57ece3380e39f4e565ebd956e6475e5f68c1a692ad5f0d289cccf3294551d7e4cb668109e1b043150819b965bac11d6c5e56ad2817ed2f2994f856a3163b248aea293134f045240f38befb7241e7566671ca80eb007ca2f0767e95484c38e73f6931976c9d105aa08f5c6fa3d21cc0f8391b559aac554e394549edbda0bd78d95a2fdad3a21cbc600ca9a244759d7952e762bf7afead7665325fcf957bc05262224460bd415ac282f74ef523eb5d6032ba3e04bad44f83509bc67961981bebc3c07c6a0228220cf5c2a7615ad36a8969c9260070d6c9d4956ed1b52084cd5d7f66a626d185ca042928f2ddd90ad97c857212fe8fec36f097903214c2aa4b3f66f1d2399ccda76a7f60df80207a7d2cecadaad1e38f4f66e45df6170f3fe209395c3562290613ddc39d0a4dcb70c21fede210ca1ede6b4a0c27d239c16a9e9682e6a34b37af1a8df7b494534d10ea1174c47a4909e3fb4cb019545621717010b42ff7b36b1b02e641c92df5f21d1aa1496c06041c632e2d949cbadcf4bc4aea549893146c9e394510c970cffb9fb22590cf9eea4915ce71a0a968963bffb7007dcf2d3debae8f7131abfdf8e447adac768daf8510b1c77f4b87824d51f1460d255e53ab833d66f489a3e202a83cb5bf8f3514bcf71c7e0dd79797e4b15fe78d19139567e1eae407fbe8534b56aed13a8c5e77c659907eb0915f0a4e3fad0ad75bbab017a419e4b162ea3b952912a22c2c9717d3208c4f5b4433252267364daaa514e9d318290de2623ada2ceb4685a68e5e8fe9d8b3ddea1f302f07cfe4341e6c3ec29ba4426ce6967f27affcf5ca0faa7c61a3bda4e99a794a47b177df8fb46860a8b25742d8e1b29bf2aa3c69cfcf7876d58961ca292b830ebd573b43f5ff6dafee0fe5cda74435ae551f97b5d9b649aa45bb2c59cd63da082014e537c33d0fb901d2da8e39deaa5fa4dad823551d714750183d675080e7b04146451c2eed15a7241c22210c680ea7f725206db13f4641b4ee57d98ba03ad291a0a366b48e1abe0fe75f14d8df19813adc5a4fd839757cd20f668e6149395ab7e9c71700335cd1be3507b35201a8e0542d399d0e3c919abf6bebf39c344d29649c2d44fe66eda90219fb4298441deb9580f5d2c0b673cc145aaae2fda35033effab0b9a4050d3584606fa2b80612120e0811a860b9917e3d5287da320476c894ea5a473531007db6fe71650e69fa59cb672bf40b7c6113328b42a6a9bc3ea8b301ea1f72082baed8ff9074a8ecc88d5b88c8fd63e3e27d790dee5117b36b07e7178a354c5c9decf57d6b46e6c5176e5c6e24cf49380289020ab6d6dbe9f7feb5c64b48330a4d69fbbb333f4e924915a5336460bd775a1bab417f514ea004c984ebe16a5806d8d956208c911f9b6aaba28c40568b445eb8a859fc2e857988821776db114f5608a2b9bdbef50093f537539b3174c377c00c56cfe6cf339e882a2ea61e80ab339be54543a851e726d72f2b0cd8e2048d9b0166f9367a506fdcb4d047dfdc5fd9c90934f5458ee9f98ba47f46a982f3306485fcddf1ed5249661c604db61c7fbb734295e16c6b8b95eeb25dbdfdfc7461c91750d78ac0c0539d207b339e799fb0904be74bb450890bf719d49e4870c60166ba98b0b26d5fc81df7942a6cfc1bcf21a5191e4f5b37ad3293b7e40d5544f6d9fe90b32255e060105f20d44db484b299aa3c5a4d8eb78d85e9a9f12f1b17ac8023f35c865c6bd2a0066ce07759602a27492b900f2695844f5ae81ba1bb21a2b01e9582795af4f9a48bbf88c404939bfe608b83e8350d30d82d5def99312fc19d58bbf6240e76e743377e98b85f62d91ee52879f0f23741457f504e14d0bff1754fd39d1d33f121f969d0cf738d711e4cabe8c60d0f5a6af016912a96b816d4559b189a84a6d82254438e465daab64f0123ba049144effb2aba499aebc459115633ad80d508a0d9be524e8b02fb62620bcb314c1a2304dd3f32a071055e2f137ca4a5922db2f3d93fe6148557ec75d436eb1b07536b7471da2b00a6d3cdb5ac4e5ff7a0f8825fae76c77e112c428745748ffd011830bedbb9dcc74bc85830e5c5cb357e01f64bf63638eb9410a223435a582283d02f49335ffc8f34ddda3c42a8a0561ae226da018c37717351ed18be8ea69b01c960200c6800f9e4580d3c9525016b4159c31f042f8df4a938cc3b7c2b9814ee3673a1c0fce86ae2f976d7bdf5ca27a8ca3f923b0aca6b32b86cd797cbcb6f602e3ccf5ccc9bf51025ffd2d0d7f404e5f49389e2ed088c6d3be60e1e770e58d6908439ce5aa7dfbfbb2121775b57f2a0d3c4e278255860681a96f8f4f69c7656d2bc2f7809ea5f276d0789fe6471c468c76a93e0920f7a7f4e6537f91cb09aea2117ab7f7ebe2dbd074a1cd95933c80df5a5b5da8e3b79b7c3538829eee341640c84184e60d3847b0ea1a4505dc56688c1d9845cfb350f65c56709c131ad17eace8b02420f0bd63404d6a38afdf209d5f130f7672bf427fc31f8aa5ee7c1bfa67519d40c95441c7fc995e4f1bd1f5abd56aac0306b88d54699dcc0d53f625cb9d01151a5eed97f24c54f78bba01ef59a4ba14541c769c8e23b59a0fe06215b36cf60c4e296f3e50cedd90e88b5614ee8bb233673e78c23ba14b89ad0306278ec1b02c461104bf8269e6ba7ac7732057de5066c7d05d840971f1efb3f5c83d0e3920a0528f776a67539da886d43ca39938ac4de28e1d9b9d2b5df25d5a94c37d27821d484f7243a103764398d94344a1f90f939ffc30c058a67bd991efc14375951e5a0df95d8d5647c1c64df5d9c64166dad5dd7a0af5f87777003af1b8f1180abc6b7c48e9ba715c3f47a8566d63f449cc264412924902e207aaada7519fa5c4066a2d2922c9bfac9e7a5f8bddf62b728d4c84bd4145648c150db5881ba2072ee15867a0d33d49d9fcac285a175e05daf1c0788deda6d90c6e893d314c2a2c6ca95d5a53e569da6bc789b499f5d3b3d5da9625019086736f906979d2e51631749db309e74e0707cc8514ec0d19ca4d1b03a06f3ef04f530f2dae8d2448b203cf186c669666fbb390df6dbf009842b9b22254610f263a85fe110715439b22b68d05a20abc3d7eadfd187affcc9ae322c660104c18c849176f64683b09bed0bdba3cac794a6a2cbc1ac8834f476efb50a1d345dc637f641f0fb74105b7bd4f337d39c2567c200d7cd8e006f6820dff7d9eb3ea74ad3091bf57afbed973600c1605b4841e20057e198783d54040d3e26f002f541300d0be35e4e521093dcfe436f3c4122291f598f64ea65a0381de842e24b737181b01c989905a88bf333b860afe8b15f1793b50e72676a7390c61d9793f6c2fc00996553ce9e67d6820b5e03b05632b6f894368730ccddf854bd880ebac2090c9c2749270a5888268e222d5574e302e0f5cc6f28ba806b9588f03a266cdd36c88dd22f51f792aef5e21164bbfafbe608dc04d86f9638f09827b6879be68c06cd0738e791fe986c58e05f429b4d2e2a63140d84aa30e19ef2fae2a16bf1e11048cd6de639eadfa7c8917747d24815235d553cde6b7aca84e25426b5687dfbb2c406407bd28cacb4d519b458b270fabfc29e6e0e19535ab48882cc811f525a954705ee06e24955115b5119459878d5a3d5d609e36f5f7ab3326e304014b01c9a18c3d87ee007d5ee14bbc72f69eda90237001d57325c8e802ef1ca72fdfd714df3883b23e32eed1245e9aac07ad8fa98948f2c34601cb5445f93616e162c851f7d8a0cea7f4880a7367a0fdefbfdcf488419cffbe7c7d41a0ec704038b0590eb8abecf3affefa3133eaa4a9300f002b2dc07e46fd50e6f2ef8953f4ca218a35e3722e46c0e699cd08ec778199ee4c2bca542e8a963594fe62d2a7c03134c87351d531902b49d0ac970378603dd5c78a779ae3c282047e1bb98d216a3e2f46e5b3450b8e53d4d8a3cd81b07511e38d71b5e88de2a5ba4145cb19fc8e6841871ff814e2200840f99dd652470d75cc31d222aeda7bac78ed18a05d240ce4fb6ad326a0ccc4ad36bd48b0ead422377e84c4101dac3b04b6e074456359bbf08542b504c0b09394cac587c1765f18bd35945b330f3df1dbb5b6c41165228d1b17ccd3bc9a29a1093ae6fc6d83b92a5dd526da8489de39c4f69ae21e0536251c0477040ca35366895ec705f0e418064b374b6ef021d73dead665916a404c8e227f6b2ffb3766c373e747645b003f442fdf84b5956cb586b9cdb4794254b5087d361eece59cc8c10b3bce276745058d278f74e672aeac242bc34089f526171ac70ba9341354bdd8e1fb3f5d69da936d19ededb76383928287b753d23638fa2a238aa3fa523966f6f29f3116c3c10e16334b342d4148ed3cd3065ae8cd848c5dbc93ed365ef97d4e1a4a7359a1c7d19121764da0b87a7ea37c49defb6df3563aaa1739a11484256963cf823dd5d0b8e4e2f0314eeeebb19228da761e1ffe3e711de2def8cb91ff9c166116dc7923098c0498620a212d2850a6f0d61a134087ca755faed866b211bc3a32458c3dda783cc3e6a4aa741e78c68c5246d9e50d8b47d6224c1aa783e40560d9a799e004ec542ba218e478edfabcd54f4b8d5d912720a6f8218c9e462b6d7b41d837d0e34294b85a3a973e728c873d787d6f03d7853e3d709e2d826fa25c2315f47474a9cf4719d736d6f4819bbb29d8ee1ed6bdcf6d8ea413c12981ca537911746cceadca94187fa67e4e80b3fd3c979d93e96b914f5b0bbe860282d90876a3a2f1ec35e4ca33841e54d132cbff5288562ce6c3321fb0785c00f5b408c28854fdac8d1e78781e3798ff899266cb13b5154d47d25f21266a002963d11bb9d322784c6056fbb43d5fb4f197a60d9c150389c7399d2ffe777f7b88aafde1c59754399704f772cf48fa23bee612fd16732ab69aef878678b206aba97b34a21d9151ea08404426487d7a7d8f29e585cfcb279db90f1281f76bf875d58e928ef3e7cc4bb90116bb7505ddd2a6166c7fe0541623e63d17185ea93f5e473a81d915e6047e6e531bddd06588ef9e5f599d8d2298b76ec4c127e1b67507220e5b551fa2613d391f15f1ff3d1359b93def1884212d9ac6b183a647da275c9c0b0741cf38fabef4e8eee8b8cecfe23134bea704dbc72da8180350bbc5ecb821b98f1bbdea81d5cff77a304bfdae3fcf8488468079dc2723e587489bf2c221fb28e089696a44cbd91e45f8926c6a975162510deeb03e0b35c0ecb4b8481a8613eb04f417d6886d3b9f0b3e5164c510240319a16e1f765fa79a6b222cd6729b38430b7c60e5f5588c6ba86c7968f3559a952cc6dae8076ff9f68eb5442b5c6349111971ac20e1f416ec089e969fddf2a6f2a6f335f4cdd65f0998e130d4a4a639682828ba22a99251b0b543dc455dd9d255b35865782cde637bde63b3f2b1938722336f0e66ca229773a1154383df69701009082a5eedfe9ada4646a8e76eaff80f594c93d5f9556bba04286e9204ce8b0e978e8f37a669b2dc7e2d26295ced74a0e70ada1ac04ba241e75a6a830cb3bcb3454a3586d890bc8db6e7cef0117f59515edbbfa1fe48f5d1a01b510ba930607becedc5f0f7e8b544af8553ae2af0a9d44b598492632ff77bb5b6e83c667f6746a70446a03ca543fec11aeed9c0c605e80bdc29b31d12ecc602d340546f6224cab9d69015fb42906ecac992d37", 0x1000}, {&(0x7f0000002180)="ba0e69a0d5053c050f232f293e04dfaef2ea596afbab92db41bf706061b669da4e47c8a9a3e54eb567c582a2af8639c4c554eabd4d93481e9472e05e2f0f7550707c0e9b752252ea7a216d12e7040bd6ca7f33a25f48321a9f5a8813c09a4f812af0cffe69aa70fb195bb4c76ba04b6647f49a0a9f9ef9272d262d19df04bf91ce7bd6493a614bcdeba4e92af08fb4cde3e742d62d23", 0x96}, {&(0x7f0000000080)="9c900ef9a2ec2080864fca6c411bfc27fb624e249daad4869e30ced3cb50a7977f7e58868354b67cdac16b0bffcc1942d685413906c2", 0x36}, {&(0x7f0000002240)="0355bc00b480acc618cd4f48838e65254fed875fc9cce2f0d089d19805a8e2e8c4605ea30f8641e9ed602766a9b05441330e4e1d450e6576d360d7ada9f0a799f96c8188624bd05aa7b1d29f4390fe3468c1f1ce64838e27d6bdb163f69b746529bf0f9e5ef5688992eacc620a6a7c8b634a13d65a02a55c096f9489b8c81cdd2a8f1174c2bad5ce6423d91b961d6ee54242c2a0b6f3a489c486f2eb097af05d4f1bdccf9a09892c68ff12cf37cee8d296c5a4c5ba", 0xb5}, {&(0x7f0000002300)="ea82f77c291bc655d25917219809b326e415442901d704d3cdaf79569a2b188bd5ce0590a3ecb1022b3eaa56eebf619289d838241da06950db8f642a87f0e91e689ea46f343d2f65cd3bd2a72c94fc15391b101050d1c53656af597625d2f5536f48998a14b7e3097ebc", 0x6a}], 0x6, &(0x7f0000002400)=[{0x100, 0x88ca8ad209b55671, 0x291, "002a87f6faa8f32d6d677f31a1438cd9719007bab1b50fe14beda640e21f9f80ff1da63fde6d19c814ae01439e6c8c450d51953d1472c912c1765836015a913d6abf239c8fd9e1eeaeb607e58dc3fe3ddc47af3f8a4002602072d6867e00944e7ad2dd04f7a228b8ca8907c7503eed557bf7b315e9253c5cc557c2b906f3012b8502ce0ccf18854c94fc22d390e358ece34f775cc91a916dcd9a97d4f0487c690b122b2139cc1a50ffcc5738762df8ac713a85a19f96685412cddd810195e81a52071b155af579848a6494035a7a2e5d52b416163847a3640003b806af089d1e741739e63f2aaac4de33b8080c"}, {0xc0, 0x111, 0x2400, "943d32d4ebfd91904fa19cad046f4a9bb5b8c76bb6af949598a9064f812c48e4ea42409dac4259f3b4678cfceabcd237d4a2a9959e205300ace4be0c2db69c577ad4503026cc5611f04166c6e60bcfbba45f1d965ffea0c3aba910fdb6408a9f03f73bf3dbe0434b42bd829f61edab51c70cd0f3ff88f79a4a2d85b6ca426b49c9bd6f88410c52d80a1e89d29b8932f739bdeb7815915f20ee8b61f79b7a90b61088851da3b9b2ef89ab80"}, {0x50, 0x111, 0xee, "24e1e18f4412e7b16d6db19a7a38cdaf9f15c34a27918172ce022b2d9cdd658224dc3484146dc5b05273372bc8fe3fe862ce1f019830c4cc7fc7588b5fc6"}, {0xc0, 0x0, 0x2, "9ce20785b886da6e7594e7455466f88e725d9769707e42ec51f1e22a75e6298cea04059356d0e136857eb612a4f3f060851450107c6f536eedefc9a0a70dfb0ca3fd0af959ef144526f6ff5307a5b7ca543a83520ca6b9f4fb4c50213866ad39e952414301db4dffcb4ba2a3b9f1e4adf21e34987e80b452d452fc6f38ae433899f708eff093808814408a0bf2cf92561a4a0c5bdc15871aa36e4733fc9cae4ba95070be460a53fc1f438a"}, {0x58, 0x100, 0x6, "1be096f99ec835c0cebec3bc0c70f6c2f950371101e6d9326ccbb23a743402d8678d49a7532bad6f63ee47ca90bb32209d09eb84f3e8039c9ab959ad7446c70f21eb2337d92be81b"}, {0x40, 0x109, 0x1, "3548524977e915d35278f41a7db3b1324ca8fb3586dbbcbb0a5c4fde98ff589994f46c063c20ee6ab4f07f085f0e842d"}, {0x78, 0x107, 0x7, "3e1bff19198dc88627d509ca51d2d9405c06177d2d3991a1957c60bbf12b625f916d583e0a3849439ce9fd26a7b148efa219adfab170e2977451f125e539c998355fd145c1daa7073bdff959f5817a0c3ca19d8d10e68135f9ff9638a96be9d0ee9b3c81"}], 0x3e0}, 0xd0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 498.728010][T19893] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.2'. [ 498.796827][T19893] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.2'. [ 498.849696][T19902] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 498.920276][T19902] CPU: 0 PID: 19902 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 498.928247][T19902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.938307][T19902] Call Trace: [ 498.941610][T19902] dump_stack+0x172/0x1f0 [ 498.945966][T19902] sysfs_warn_dup.cold+0x1c/0x31 [ 498.950999][T19902] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 498.957072][T19902] sysfs_create_link+0x65/0xc0 [ 498.961845][T19902] device_add+0x75c/0x17a0 [ 498.966260][T19902] ? mark_lock+0xc2/0x1220 [ 498.970682][T19902] ? uevent_show+0x370/0x370 [ 498.975269][T19902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 498.981518][T19902] wiphy_register+0x1c46/0x2720 [ 498.986376][T19902] ? wiphy_unregister+0x1040/0x1040 [ 498.991574][T19902] ? __kmalloc+0x608/0x770 [ 498.995987][T19902] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 499.001793][T19902] ? lockdep_hardirqs_on+0x421/0x5e0 [ 499.007079][T19902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 499.013315][T19902] ? ieee80211_cs_list_valid+0x1a1/0x280 19:55:41 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb08001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 499.018950][T19902] ieee80211_register_hw+0x157e/0x3ac0 [ 499.024421][T19902] ? ieee80211_ifa_changed+0xde0/0xde0 [ 499.029880][T19902] ? memset+0x32/0x40 [ 499.033863][T19902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 499.040098][T19902] ? __hrtimer_init+0x13d/0x280 [ 499.044986][T19902] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 499.050714][T19902] ? __kasan_check_read+0x11/0x20 [ 499.055765][T19902] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 499.062207][T19902] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 499.068120][T19902] hwsim_new_radio_nl+0x9e3/0x1070 [ 499.073232][T19902] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 499.073247][T19902] ? nla_memcpy+0xb0/0xb0 [ 499.073268][T19902] ? __nla_parse+0x43/0x60 [ 499.073289][T19902] genl_family_rcv_msg+0x74b/0xf90 [ 499.073314][T19902] ? genl_unregister_family+0x7b0/0x7b0 [ 499.098583][T19902] ? __kasan_check_read+0x11/0x20 [ 499.103626][T19902] ? __lock_acquire+0x16f2/0x4a00 [ 499.108667][T19902] ? __dev_queue_xmit+0xbb5/0x3720 [ 499.113815][T19902] genl_rcv_msg+0xca/0x170 [ 499.118253][T19902] netlink_rcv_skb+0x177/0x450 [ 499.123039][T19902] ? genl_family_rcv_msg+0xf90/0xf90 [ 499.128342][T19902] ? netlink_ack+0xb50/0xb50 [ 499.132941][T19902] ? __kasan_check_write+0x14/0x20 [ 499.138061][T19902] ? netlink_deliver_tap+0x254/0xbf0 [ 499.143356][T19902] genl_rcv+0x29/0x40 [ 499.147354][T19902] netlink_unicast+0x531/0x710 [ 499.152136][T19902] ? netlink_attachskb+0x7c0/0x7c0 [ 499.157257][T19902] ? _copy_from_iter_full+0x25d/0x8c0 [ 499.162709][T19902] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 499.168426][T19902] ? __check_object_size+0x3d/0x437 [ 499.173616][T19902] netlink_sendmsg+0x8a5/0xd60 [ 499.178368][T19902] ? netlink_unicast+0x710/0x710 [ 499.184073][T19902] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 499.189864][T19902] ? apparmor_socket_sendmsg+0x2a/0x30 [ 499.195306][T19902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 499.201527][T19902] ? security_socket_sendmsg+0x8d/0xc0 [ 499.206978][T19902] ? netlink_unicast+0x710/0x710 [ 499.211901][T19902] sock_sendmsg+0xd7/0x130 [ 499.216302][T19902] ___sys_sendmsg+0x803/0x920 [ 499.220966][T19902] ? copy_msghdr_from_user+0x440/0x440 [ 499.226935][T19902] ? __kasan_check_read+0x11/0x20 [ 499.231956][T19902] ? __fget+0x384/0x560 [ 499.236100][T19902] ? ksys_dup3+0x3e0/0x3e0 [ 499.240503][T19902] ? __fget_light+0x1a9/0x230 [ 499.245163][T19902] ? __fdget+0x1b/0x20 [ 499.249214][T19902] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 499.255443][T19902] __sys_sendmsg+0x105/0x1d0 [ 499.260019][T19902] ? __sys_sendmsg_sock+0xd0/0xd0 [ 499.265042][T19902] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 499.270489][T19902] ? do_syscall_64+0x26/0x760 [ 499.275149][T19902] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 499.281194][T19902] ? do_syscall_64+0x26/0x760 [ 499.285857][T19902] __x64_sys_sendmsg+0x78/0xb0 [ 499.290611][T19902] do_syscall_64+0xfa/0x760 [ 499.295107][T19902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 499.301001][T19902] RIP: 0033:0x459a59 [ 499.304895][T19902] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 499.324478][T19902] RSP: 002b:00007f4bf17e3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 499.332969][T19902] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 499.341007][T19902] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 499.348965][T19902] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 499.356930][T19902] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf17e46d4 [ 499.364882][T19902] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:41 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:41 executing program 1: socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r1, 0x0, 0x5}, 0x3c) openat$cgroup_type(r1, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r1, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x6, 0xea, 0x5, 0x0, 0x200, 0x40000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x2111, 0x8000, 0x100, 0x0, 0x31f, 0xccae, 0xfff8}, 0xffffffffffffffff, 0x5, r1, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r5, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) [ 499.422451][T19911] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.2'. 19:55:41 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:41 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb0c001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:42 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0407b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:42 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:42 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 499.841268][T19929] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 499.881052][T19930] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 499.922906][T19930] CPU: 1 PID: 19930 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 499.930847][T19930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.940913][T19930] Call Trace: [ 499.944226][T19930] dump_stack+0x172/0x1f0 [ 499.948572][T19930] sysfs_warn_dup.cold+0x1c/0x31 [ 499.953525][T19930] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 499.959607][T19930] sysfs_create_link+0x65/0xc0 [ 499.964384][T19930] device_add+0x75c/0x17a0 [ 499.968816][T19930] ? mark_lock+0xc2/0x1220 [ 499.973252][T19930] ? uevent_show+0x370/0x370 [ 499.977845][T19930] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 499.984106][T19930] wiphy_register+0x1c46/0x2720 [ 499.988983][T19930] ? wiphy_unregister+0x1040/0x1040 [ 499.994196][T19930] ? __kmalloc+0x608/0x770 [ 499.998639][T19930] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 500.004460][T19930] ? lockdep_hardirqs_on+0x421/0x5e0 [ 500.010021][T19930] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 500.016285][T19930] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 500.021925][T19930] ieee80211_register_hw+0x157e/0x3ac0 [ 500.027412][T19930] ? ieee80211_ifa_changed+0xde0/0xde0 [ 500.032886][T19930] ? memset+0x32/0x40 [ 500.036914][T19930] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 500.043174][T19930] ? __hrtimer_init+0x13d/0x280 [ 500.048052][T19930] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 500.053785][T19930] ? __kasan_check_read+0x11/0x20 [ 500.058838][T19930] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 500.065266][T19930] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 500.071174][T19930] hwsim_new_radio_nl+0x9e3/0x1070 [ 500.076297][T19930] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 500.082196][T19930] ? nla_memcpy+0xb0/0xb0 [ 500.086540][T19930] ? __nla_parse+0x43/0x60 [ 500.090966][T19930] genl_family_rcv_msg+0x74b/0xf90 [ 500.096102][T19930] ? genl_unregister_family+0x7b0/0x7b0 [ 500.101655][T19930] ? __kasan_check_read+0x11/0x20 [ 500.106693][T19930] ? __lock_acquire+0x16f2/0x4a00 [ 500.111722][T19930] ? __dev_queue_xmit+0xbb5/0x3720 [ 500.116859][T19930] genl_rcv_msg+0xca/0x170 [ 500.121295][T19930] netlink_rcv_skb+0x177/0x450 [ 500.126068][T19930] ? genl_family_rcv_msg+0xf90/0xf90 [ 500.131364][T19930] ? netlink_ack+0xb50/0xb50 [ 500.135959][T19930] ? __kasan_check_write+0x14/0x20 [ 500.141082][T19930] ? netlink_deliver_tap+0x254/0xbf0 [ 500.146384][T19930] genl_rcv+0x29/0x40 [ 500.150373][T19930] netlink_unicast+0x531/0x710 [ 500.155152][T19930] ? netlink_attachskb+0x7c0/0x7c0 [ 500.160270][T19930] ? _copy_from_iter_full+0x25d/0x8c0 [ 500.165651][T19930] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 500.171382][T19930] ? __check_object_size+0x3d/0x437 [ 500.176595][T19930] netlink_sendmsg+0x8a5/0xd60 [ 500.181382][T19930] ? netlink_unicast+0x710/0x710 [ 500.186329][T19930] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 500.191891][T19930] ? apparmor_socket_sendmsg+0x2a/0x30 [ 500.197362][T19930] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 500.203615][T19930] ? security_socket_sendmsg+0x8d/0xc0 [ 500.211174][T19930] ? netlink_unicast+0x710/0x710 [ 500.216218][T19930] sock_sendmsg+0xd7/0x130 [ 500.220671][T19930] ___sys_sendmsg+0x803/0x920 [ 500.225366][T19930] ? copy_msghdr_from_user+0x440/0x440 [ 500.230855][T19930] ? __rcu_read_unlock+0x220/0x6b0 [ 500.235980][T19930] ? __kasan_check_read+0x11/0x20 [ 500.241033][T19930] ? __fget+0x384/0x560 [ 500.245212][T19930] ? ksys_dup3+0x3e0/0x3e0 [ 500.249648][T19930] ? __fget_light+0x1a9/0x230 [ 500.254335][T19930] ? __fdget+0x1b/0x20 [ 500.258430][T19930] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 500.264694][T19930] __sys_sendmsg+0x105/0x1d0 [ 500.269301][T19930] ? __sys_sendmsg_sock+0xd0/0xd0 [ 500.274351][T19930] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 500.279825][T19930] ? do_syscall_64+0x26/0x760 [ 500.284514][T19930] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 500.290588][T19930] ? do_syscall_64+0x26/0x760 [ 500.295284][T19930] __x64_sys_sendmsg+0x78/0xb0 [ 500.300069][T19930] do_syscall_64+0xfa/0x760 [ 500.304584][T19930] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 500.310478][T19930] RIP: 0033:0x459a59 [ 500.314380][T19930] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 500.333990][T19930] RSP: 002b:00007f4bf17e3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 500.342415][T19930] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 500.350374][T19930] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 500.358329][T19930] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 500.366284][T19930] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf17e46d4 [ 500.374236][T19930] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:42 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb0e001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:42 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0408b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:42 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb10001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 500.629988][T19956] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 500.647070][T19956] CPU: 0 PID: 19956 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 500.655026][T19956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 500.665086][T19956] Call Trace: [ 500.668390][T19956] dump_stack+0x172/0x1f0 [ 500.672741][T19956] sysfs_warn_dup.cold+0x1c/0x31 19:55:43 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x26) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 500.677692][T19956] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 500.683774][T19956] sysfs_create_link+0x65/0xc0 [ 500.688546][T19956] device_add+0x75c/0x17a0 [ 500.692989][T19956] ? mark_lock+0xc2/0x1220 [ 500.697426][T19956] ? uevent_show+0x370/0x370 [ 500.702029][T19956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 500.708314][T19956] wiphy_register+0x1c46/0x2720 [ 500.713194][T19956] ? wiphy_unregister+0x1040/0x1040 [ 500.718409][T19956] ? __kmalloc+0x608/0x770 [ 500.722834][T19956] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 500.722852][T19956] ? lockdep_hardirqs_on+0x421/0x5e0 [ 500.722869][T19956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 500.722887][T19956] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 500.733944][T19956] ieee80211_register_hw+0x157e/0x3ac0 [ 500.733969][T19956] ? ieee80211_ifa_changed+0xde0/0xde0 [ 500.733985][T19956] ? memset+0x32/0x40 [ 500.734004][T19956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 500.766932][T19956] ? __hrtimer_init+0x13d/0x280 [ 500.771808][T19956] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 500.777588][T19956] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 500.784027][T19956] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 500.789959][T19956] hwsim_new_radio_nl+0x9e3/0x1070 [ 500.795093][T19956] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 500.801011][T19956] ? nla_memcpy+0xb0/0xb0 [ 500.805397][T19956] ? __nla_parse+0x43/0x60 [ 500.809900][T19956] genl_family_rcv_msg+0x74b/0xf90 [ 500.815018][T19956] ? genl_unregister_family+0x7b0/0x7b0 [ 500.820568][T19956] ? __kasan_check_read+0x11/0x20 [ 500.825593][T19956] ? __lock_acquire+0x16f2/0x4a00 [ 500.830614][T19956] ? __dev_queue_xmit+0xbb5/0x3720 [ 500.835742][T19956] genl_rcv_msg+0xca/0x170 [ 500.840164][T19956] netlink_rcv_skb+0x177/0x450 [ 500.844918][T19956] ? genl_family_rcv_msg+0xf90/0xf90 [ 500.850185][T19956] ? netlink_ack+0xb50/0xb50 [ 500.854771][T19956] ? __kasan_check_write+0x14/0x20 [ 500.859910][T19956] ? netlink_deliver_tap+0x254/0xbf0 [ 500.865205][T19956] genl_rcv+0x29/0x40 [ 500.869193][T19956] netlink_unicast+0x531/0x710 [ 500.873952][T19956] ? netlink_attachskb+0x7c0/0x7c0 [ 500.879069][T19956] ? _copy_from_iter_full+0x25d/0x8c0 [ 500.884441][T19956] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 500.890153][T19956] ? __check_object_size+0x3d/0x437 [ 500.895339][T19956] netlink_sendmsg+0x8a5/0xd60 [ 500.900106][T19956] ? netlink_unicast+0x710/0x710 [ 500.905034][T19956] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 500.910563][T19956] ? apparmor_socket_sendmsg+0x2a/0x30 [ 500.916095][T19956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 500.922322][T19956] ? security_socket_sendmsg+0x8d/0xc0 [ 500.927784][T19956] ? netlink_unicast+0x710/0x710 [ 500.932713][T19956] sock_sendmsg+0xd7/0x130 [ 500.937111][T19956] ___sys_sendmsg+0x803/0x920 [ 500.941775][T19956] ? copy_msghdr_from_user+0x440/0x440 [ 500.947228][T19956] ? __kasan_check_read+0x11/0x20 [ 500.952254][T19956] ? __fget+0x384/0x560 [ 500.956412][T19956] ? ksys_dup3+0x3e0/0x3e0 [ 500.960813][T19956] ? __fget_light+0x1a9/0x230 [ 500.965484][T19956] ? __fdget+0x1b/0x20 [ 500.969535][T19956] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 500.975761][T19956] __sys_sendmsg+0x105/0x1d0 [ 500.980335][T19956] ? __sys_sendmsg_sock+0xd0/0xd0 [ 500.985352][T19956] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 500.990805][T19956] ? do_syscall_64+0x26/0x760 [ 500.995472][T19956] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 501.001541][T19956] ? do_syscall_64+0x26/0x760 [ 501.006208][T19956] __x64_sys_sendmsg+0x78/0xb0 [ 501.010983][T19956] do_syscall_64+0xfa/0x760 [ 501.015839][T19956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 501.021807][T19956] RIP: 0033:0x459a59 [ 501.025703][T19956] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 501.045333][T19956] RSP: 002b:00007f4bf17e3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 501.053786][T19956] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 501.061742][T19956] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 501.069714][T19956] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 501.077675][T19956] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf17e46d4 [ 501.085638][T19956] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff [ 501.112701][T19964] __nla_validate_parse: 1 callbacks suppressed [ 501.112710][T19964] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 19:55:43 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:43 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) [ 501.130398][T19958] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 19:55:43 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:43 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0409b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:43 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb12001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:43 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = socket$kcm(0x29, 0x5, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) r6 = openat$cgroup_ro(r5, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) r8 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000940)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r10, &(0x7f0000000980)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_pid(r9, &(0x7f00000000c0), 0x12) r11 = openat$cgroup_ro(r9, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r11, 0x0, 0x5}, 0x3c) openat$cgroup_type(r11, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r11, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000003c0)={r11, &(0x7f0000000300)="35063fb4a7f25d2d36f53a9eacaaceb8f1f4eac8b4bd7494892c8521c060493089c1b39c6d57aba1237c9154f75d868a5c3df3f4ed5fe37f7ff963a5332bff7d84a41056cd6d45e46f3a701107b7fb231e5544b0b5df33db596762657bb3a72992395e43d6b07f2b6d9dcdc89ee14ad8716d930d9d871f3c1f4d44b6cfde574a6c4cb52f2f63d96a86368af2d6e34aed30b17ee8660925f811b67cf42ec6ab6a2e16"}, 0x20) r12 = openat$cgroup_ro(r8, &(0x7f0000000280)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r12, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(r7, &(0x7f0000004600)={&(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000180)=""/9, 0x1}, 0x10040) sendmsg$kcm(r6, &(0x7f0000000700)={&(0x7f0000000400)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000640)="754390d79e6ec094ec25a1b9a10ede8aea1c4a96dc742e192d940718e86c8e8283ab328a252cfea2c6cb1ed97ff780434cef03bff498c4ced092e5f4bddacd60a13170cb45f8d168f45759973d93d1b01ebb752bb38c5a36625ccb6b462204a16be519429ec53d62e6af65a1a922c008b989c1cf86c697ac5c0feba8f10d87342f4d89f2b58ff7825309eeb669bcaaf4c441f8ef9d938412f7eedd6c84b9b30d8ea55a0e2f21ba050795a4", 0xab}, {&(0x7f0000000a00)="c5ca1d6010c88e445145536dafcb76419313d317e073711fb1f8f0500fe462d4d90a6ea8a4f6bb5318553ca57f60803c02c169a82344a0c1868fbd9023bf1181aac3a01e2c83fcc66e62c5c1040ef91d7d95d8ceb38f9ae2d291d1cb0cab9531fd38702a3cd3a23ceee40f1dcfc4befe89228a00e41cfaa33f00dee4326283e8e6a15c1d55ad969984942233a0ee8c2ee317eac034de2e4a8200cca758305a667d88fc526e9d780d9519be5df36bd43b82d8abce20f533659e44810dc4d0e3ff2a8e9e8293f0cdaaadef0552ab40", 0xce}, {&(0x7f0000000580)="6c56ae07a4b441d739e0cef485043ef1e32898a8eb1d11052bbd50d0b118a016ecff6676ff2e513b77702524d3a623665ddb47974ef8f8d5787a9b1fd1bad18f25144e", 0x43}, {&(0x7f0000000880)="2bb1a9f0f4902b5cca38f19a5d741d66660c10dc6fd0094708080509eb2d48071121859b2114bad09244b9bd8dc77888507766c399e98b2277fc5e6bc9b066e13f9c1ee2f02fa2dbc1bc5ee0b0402123a77f5ab10eea59f04b00dc90ba968888d26c52be79a3054eb1d56d6c7830969be3094926d6f5e8df7816ad4c", 0x7c}], 0x4, &(0x7f0000000c00)=[{0x50, 0x17, 0x1000, "11f3cb8d2a0d0c39a2823e5f16957ab2c56df4f664fd69617fccd88826ac3d7281ae39d00cb91ccc4c74ba242c2b37b82f8f5c596dfb3d790fa8cb"}, {0x78, 0x110, 0x0, "eee3ef79fa8316e70e44e95034a775912a8b89879ed33b906bf5abc4d143f58a3514365abb28df3cc8f47ad948afd51d709713d70eb8db9d8139e4ff683e234f29ad5ee96019ca253ac6f2fccc4601dacbdc8c241973798e9973839fd35f179bf79a4356"}, {0xa8, 0x0, 0x10001, "3fab3284f08b91bca5e36fd58f76c023b140d4a06fabc0f34d2ec9556f8434b152dca127a9f73dd9244250733e158fbcd0582272c7da4996076a8a3bb7cb794a48325642f5a2cfabcbaf4830210f2992848d9cc23719c082c9566774821e0861cc4afa1db19f0d23d49403d4506dd9135ea1a9615db00aebaa952313decc8e7ea352a1606fa75b12b85a1bd0194f91389c46"}], 0x170}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r12, 0x6, [], r13, r12, 0x1, 0x4}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0xffffffff, 0x8a67, 0x4, 0x20, 0xffffffffffffffff, 0x10000, [], r13, r4, 0x1, 0x3}, 0x3c) [ 501.395027][T19978] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. [ 501.439926][T19984] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 501.459138][T19984] CPU: 1 PID: 19984 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 501.467077][T19984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.477145][T19984] Call Trace: [ 501.480453][T19984] dump_stack+0x172/0x1f0 [ 501.484827][T19984] sysfs_warn_dup.cold+0x1c/0x31 [ 501.489789][T19984] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 501.495885][T19984] sysfs_create_link+0x65/0xc0 [ 501.500664][T19984] device_add+0x75c/0x17a0 [ 501.505093][T19984] ? mark_lock+0xc2/0x1220 [ 501.509539][T19984] ? uevent_show+0x370/0x370 [ 501.514156][T19984] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 501.520440][T19984] wiphy_register+0x1c46/0x2720 [ 501.525326][T19984] ? wiphy_unregister+0x1040/0x1040 [ 501.530551][T19984] ? __kmalloc+0x608/0x770 [ 501.535000][T19984] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 501.540828][T19984] ? lockdep_hardirqs_on+0x421/0x5e0 [ 501.546147][T19984] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 501.552408][T19984] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 501.558058][T19984] ieee80211_register_hw+0x157e/0x3ac0 [ 501.563540][T19984] ? ieee80211_ifa_changed+0xde0/0xde0 [ 501.569021][T19984] ? memset+0x32/0x40 [ 501.573021][T19984] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 501.579281][T19984] ? __hrtimer_init+0x13d/0x280 [ 501.584153][T19984] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 501.589885][T19984] ? __kasan_check_read+0x11/0x20 [ 501.594909][T19984] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 501.601313][T19984] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 501.607194][T19984] hwsim_new_radio_nl+0x9e3/0x1070 [ 501.612299][T19984] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 501.618186][T19984] ? nla_memcpy+0xb0/0xb0 [ 501.622506][T19984] ? __nla_parse+0x43/0x60 [ 501.626913][T19984] genl_family_rcv_msg+0x74b/0xf90 [ 501.632014][T19984] ? genl_unregister_family+0x7b0/0x7b0 [ 501.637542][T19984] ? __kasan_check_read+0x11/0x20 [ 501.642552][T19984] ? __lock_acquire+0x16f2/0x4a00 [ 501.647568][T19984] ? __dev_queue_xmit+0xbb5/0x3720 [ 501.652688][T19984] genl_rcv_msg+0xca/0x170 [ 501.657090][T19984] netlink_rcv_skb+0x177/0x450 [ 501.661837][T19984] ? genl_family_rcv_msg+0xf90/0xf90 [ 501.667105][T19984] ? netlink_ack+0xb50/0xb50 [ 501.671676][T19984] ? __kasan_check_write+0x14/0x20 [ 501.676773][T19984] ? netlink_deliver_tap+0x254/0xbf0 [ 501.682045][T19984] genl_rcv+0x29/0x40 [ 501.686018][T19984] netlink_unicast+0x531/0x710 [ 501.690770][T19984] ? netlink_attachskb+0x7c0/0x7c0 [ 501.695871][T19984] ? _copy_from_iter_full+0x25d/0x8c0 [ 501.701234][T19984] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 501.706936][T19984] ? __check_object_size+0x3d/0x437 [ 501.712123][T19984] netlink_sendmsg+0x8a5/0xd60 [ 501.716873][T19984] ? netlink_unicast+0x710/0x710 [ 501.721806][T19984] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 501.727336][T19984] ? apparmor_socket_sendmsg+0x2a/0x30 [ 501.732777][T19984] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 501.738997][T19984] ? security_socket_sendmsg+0x8d/0xc0 [ 501.744436][T19984] ? netlink_unicast+0x710/0x710 [ 501.749359][T19984] sock_sendmsg+0xd7/0x130 [ 501.753761][T19984] ___sys_sendmsg+0x803/0x920 [ 501.758421][T19984] ? copy_msghdr_from_user+0x440/0x440 [ 501.763868][T19984] ? __kasan_check_read+0x11/0x20 [ 501.768879][T19984] ? __fget+0x384/0x560 [ 501.773024][T19984] ? ksys_dup3+0x3e0/0x3e0 [ 501.777431][T19984] ? __fget_light+0x1a9/0x230 [ 501.782090][T19984] ? __fdget+0x1b/0x20 [ 501.786142][T19984] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 501.792383][T19984] __sys_sendmsg+0x105/0x1d0 [ 501.796957][T19984] ? __sys_sendmsg_sock+0xd0/0xd0 [ 501.801984][T19984] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 501.807422][T19984] ? do_syscall_64+0x26/0x760 [ 501.812085][T19984] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 501.818146][T19984] ? do_syscall_64+0x26/0x760 [ 501.822814][T19984] __x64_sys_sendmsg+0x78/0xb0 [ 501.827561][T19984] do_syscall_64+0xfa/0x760 [ 501.832058][T19984] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 501.837931][T19984] RIP: 0033:0x459a59 [ 501.841813][T19984] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 501.861498][T19984] RSP: 002b:00007f4bf17e3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 501.869893][T19984] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 501.877854][T19984] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 501.885822][T19984] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 501.893774][T19984] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf17e46d4 [ 501.901763][T19984] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:44 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb19001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:44 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf040ab0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:44 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb1a001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 502.155942][T20002] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 502.179282][T20002] CPU: 1 PID: 20002 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 502.187242][T20002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.197312][T20002] Call Trace: [ 502.200623][T20002] dump_stack+0x172/0x1f0 [ 502.204981][T20002] sysfs_warn_dup.cold+0x1c/0x31 [ 502.209951][T20002] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 502.216042][T20002] sysfs_create_link+0x65/0xc0 [ 502.220827][T20002] device_add+0x75c/0x17a0 [ 502.225247][T20002] ? mark_lock+0xc2/0x1220 [ 502.225269][T20002] ? uevent_show+0x370/0x370 [ 502.234239][T20002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 502.234264][T20002] wiphy_register+0x1c46/0x2720 [ 502.234286][T20002] ? wiphy_unregister+0x1040/0x1040 [ 502.234308][T20002] ? __kmalloc+0x608/0x770 [ 502.234328][T20002] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 502.260887][T20002] ? lockdep_hardirqs_on+0x421/0x5e0 [ 502.266233][T20002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 502.272513][T20002] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 502.278151][T20002] ieee80211_register_hw+0x157e/0x3ac0 [ 502.283629][T20002] ? ieee80211_ifa_changed+0xde0/0xde0 [ 502.289101][T20002] ? memset+0x32/0x40 [ 502.293105][T20002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 502.299355][T20002] ? __hrtimer_init+0x13d/0x280 [ 502.304233][T20002] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 502.309988][T20002] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 502.316426][T20002] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 502.322343][T20002] hwsim_new_radio_nl+0x9e3/0x1070 [ 502.327473][T20002] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 502.333377][T20002] ? nla_memcpy+0xb0/0xb0 [ 502.337733][T20002] ? __nla_parse+0x43/0x60 [ 502.342173][T20002] genl_family_rcv_msg+0x74b/0xf90 [ 502.347310][T20002] ? genl_unregister_family+0x7b0/0x7b0 [ 502.352873][T20002] ? __kasan_check_read+0x11/0x20 [ 502.357915][T20002] ? __lock_acquire+0x16f2/0x4a00 [ 502.362949][T20002] ? __dev_queue_xmit+0xbb5/0x3720 [ 502.368097][T20002] genl_rcv_msg+0xca/0x170 [ 502.372532][T20002] netlink_rcv_skb+0x177/0x450 [ 502.377313][T20002] ? genl_family_rcv_msg+0xf90/0xf90 [ 502.382614][T20002] ? netlink_ack+0xb50/0xb50 [ 502.387240][T20002] ? __kasan_check_write+0x14/0x20 [ 502.392368][T20002] ? netlink_deliver_tap+0x254/0xbf0 [ 502.397667][T20002] genl_rcv+0x29/0x40 [ 502.401657][T20002] netlink_unicast+0x531/0x710 [ 502.406433][T20002] ? netlink_attachskb+0x7c0/0x7c0 [ 502.411550][T20002] ? _copy_from_iter_full+0x25d/0x8c0 [ 502.416952][T20002] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 502.422680][T20002] ? __check_object_size+0x3d/0x437 [ 502.427892][T20002] netlink_sendmsg+0x8a5/0xd60 [ 502.432679][T20002] ? netlink_unicast+0x710/0x710 [ 502.437625][T20002] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 502.443191][T20002] ? apparmor_socket_sendmsg+0x2a/0x30 [ 502.448679][T20002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 502.454940][T20002] ? security_socket_sendmsg+0x8d/0xc0 [ 502.460410][T20002] ? netlink_unicast+0x710/0x710 [ 502.465360][T20002] sock_sendmsg+0xd7/0x130 [ 502.465375][T20002] ___sys_sendmsg+0x803/0x920 [ 502.465391][T20002] ? copy_msghdr_from_user+0x440/0x440 [ 502.465412][T20002] ? __kasan_check_read+0x11/0x20 [ 502.465431][T20002] ? __fget+0x384/0x560 [ 502.465450][T20002] ? ksys_dup3+0x3e0/0x3e0 [ 502.465471][T20002] ? __fget_light+0x1a9/0x230 [ 502.498254][T20002] ? __fdget+0x1b/0x20 [ 502.502345][T20002] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 502.508609][T20002] __sys_sendmsg+0x105/0x1d0 [ 502.513216][T20002] ? __sys_sendmsg_sock+0xd0/0xd0 [ 502.518261][T20002] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 502.523738][T20002] ? do_syscall_64+0x26/0x760 [ 502.528419][T20002] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 502.534491][T20002] ? do_syscall_64+0x26/0x760 [ 502.539185][T20002] __x64_sys_sendmsg+0x78/0xb0 [ 502.543964][T20002] do_syscall_64+0xfa/0x760 [ 502.548479][T20002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 502.554372][T20002] RIP: 0033:0x459a59 [ 502.558279][T20002] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 502.577905][T20002] RSP: 002b:00007f4bf17e3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 502.586333][T20002] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 502.594320][T20002] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 19:55:44 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:44 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:44 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) [ 502.602308][T20002] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 502.610295][T20002] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf17e46d4 [ 502.618286][T20002] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:45 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb58001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:45 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf040bb0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 502.920941][T20030] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 502.948104][T20030] CPU: 1 PID: 20030 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 502.956040][T20030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.967326][T20030] Call Trace: [ 502.970635][T20030] dump_stack+0x172/0x1f0 [ 502.974986][T20030] sysfs_warn_dup.cold+0x1c/0x31 [ 502.979961][T20030] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 502.986043][T20030] sysfs_create_link+0x65/0xc0 [ 502.990820][T20030] device_add+0x75c/0x17a0 [ 502.995245][T20030] ? uevent_show+0x370/0x370 [ 502.999827][T20030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.006075][T20030] wiphy_register+0x1c46/0x2720 [ 503.010921][T20030] ? wiphy_unregister+0x1040/0x1040 [ 503.016108][T20030] ? __kmalloc+0x608/0x770 [ 503.020547][T20030] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 503.026338][T20030] ? lockdep_hardirqs_on+0x421/0x5e0 [ 503.031628][T20030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.037881][T20030] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 503.043521][T20030] ieee80211_register_hw+0x157e/0x3ac0 [ 503.048989][T20030] ? ieee80211_ifa_changed+0xde0/0xde0 [ 503.054447][T20030] ? memset+0x32/0x40 [ 503.058420][T20030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.064646][T20030] ? __hrtimer_init+0x13d/0x280 [ 503.069507][T20030] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 503.075220][T20030] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 503.081622][T20030] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 503.087512][T20030] hwsim_new_radio_nl+0x9e3/0x1070 [ 503.092611][T20030] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 503.098511][T20030] ? nla_memcpy+0xb0/0xb0 [ 503.102829][T20030] ? __nla_parse+0x43/0x60 [ 503.107230][T20030] genl_family_rcv_msg+0x74b/0xf90 [ 503.112339][T20030] ? genl_unregister_family+0x7b0/0x7b0 [ 503.117879][T20030] ? __kasan_check_read+0x11/0x20 [ 503.122886][T20030] ? __lock_acquire+0x16f2/0x4a00 [ 503.127890][T20030] ? __dev_queue_xmit+0xbb5/0x3720 [ 503.133001][T20030] genl_rcv_msg+0xca/0x170 [ 503.137429][T20030] netlink_rcv_skb+0x177/0x450 [ 503.142204][T20030] ? genl_family_rcv_msg+0xf90/0xf90 [ 503.147481][T20030] ? netlink_ack+0xb50/0xb50 [ 503.152078][T20030] ? __kasan_check_write+0x14/0x20 [ 503.157200][T20030] ? netlink_deliver_tap+0x254/0xbf0 [ 503.162491][T20030] genl_rcv+0x29/0x40 [ 503.166458][T20030] netlink_unicast+0x531/0x710 [ 503.171221][T20030] ? netlink_attachskb+0x7c0/0x7c0 [ 503.176342][T20030] ? _copy_from_iter_full+0x25d/0x8c0 [ 503.181722][T20030] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 503.187460][T20030] ? __check_object_size+0x3d/0x437 [ 503.192672][T20030] netlink_sendmsg+0x8a5/0xd60 [ 503.197432][T20030] ? netlink_unicast+0x710/0x710 [ 503.202366][T20030] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 503.207896][T20030] ? apparmor_socket_sendmsg+0x2a/0x30 [ 503.213349][T20030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.219578][T20030] ? security_socket_sendmsg+0x8d/0xc0 [ 503.225030][T20030] ? netlink_unicast+0x710/0x710 [ 503.229965][T20030] sock_sendmsg+0xd7/0x130 [ 503.234382][T20030] ___sys_sendmsg+0x803/0x920 [ 503.239057][T20030] ? copy_msghdr_from_user+0x440/0x440 [ 503.244516][T20030] ? __kasan_check_read+0x11/0x20 [ 503.249525][T20030] ? __fget+0x384/0x560 [ 503.253670][T20030] ? ksys_dup3+0x3e0/0x3e0 [ 503.258081][T20030] ? __fget_light+0x1a9/0x230 [ 503.262751][T20030] ? __fdget+0x1b/0x20 [ 503.266803][T20030] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 503.273038][T20030] __sys_sendmsg+0x105/0x1d0 [ 503.277611][T20030] ? __sys_sendmsg_sock+0xd0/0xd0 [ 503.282624][T20030] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 503.288063][T20030] ? do_syscall_64+0x26/0x760 [ 503.292726][T20030] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.298770][T20030] ? do_syscall_64+0x26/0x760 [ 503.303443][T20030] __x64_sys_sendmsg+0x78/0xb0 [ 503.308200][T20030] do_syscall_64+0xfa/0x760 [ 503.312696][T20030] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.318570][T20030] RIP: 0033:0x459a59 [ 503.322458][T20030] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 503.342062][T20030] RSP: 002b:00007f4bf17e3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 503.350466][T20030] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 503.358419][T20030] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 19:55:45 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r3, 0xffffffffffffffff, 0x0, 0x55, &(0x7f0000000200)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B'}, 0x30) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r4, 0x10, &(0x7f00000005c0)={&(0x7f0000000540)=""/80, 0x50, 0xffffffffffffffff}}, 0x1b5) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x14, &(0x7f0000000ac0)=ANY=[@ANYBLOB="b702000003000002bfa30000000000000703000000feffff7a0af0fff8ffffff79a4ff0048d267df060000fffffffb41ce4f000000000065040400010000000000000000006a0a00fe00000000850000871cd52d6f43ad37900ea30647df659e3c2ea7e5b70137453072080eb0d767cd0800000038f9fdfa6e69e7285800000000000000000000eaffffffffff070000000000620ed03954675eb3d05aeb0c7008395eba0dbf486744ef66061e2294dbbc9a27cd16869ef83161e32da77236174bbf00d5d26dd00ba6582c69af70a46dde5f674b67500f287d0075353c9d11f302a5f32e8e850f11ec3fb7538045327b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r4, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000026c0)={r4}) perf_event_open(&(0x7f0000000a40)={0x5, 0x70, 0xfd, 0x40, 0x1, 0x89, 0x0, 0x1, 0xc010, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x865173e240c3f3b3, 0x200, 0x4, 0x8, 0x562, 0x6, 0x2b}, r3, 0xe, r4, 0x8) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440)=r3, 0x12) r5 = socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='y\xf3mory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(r2, &(0x7f0000000400)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x1, @local, 'bridge_slave_0\x00'}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000200)="d531e55aa89b60ef37c1828b97fca3f1ab9883e42cdf6d2297cacaee6f5932d37aa8350a7b5d8884a61466d721e1d6253029ba072b4dca5b061de3a7b51f8d72557a0d35f77625aa0baea9e5149aec5006f5ab44c9907c128910fd36f39c09ac66a54f22dcb9", 0x66}, {&(0x7f0000000280)="c7694529c279698cb98e0d0613fe1868d15c75d96e45c839119f0d0b9cb576890d75938a7ddc8cd7447b9a1684f520851ca6d13c9f15167e4657b4d8e89c382ab3fb0d77132e66010ea728d8d5ac083af0eacd5ee7407b899e2d3130a6689783317eee3e4fa65f9e2d3db04525e829d7c7d02f6c177fca10d42e73dba2775cf9a69ddd20d4a46b4ae417a3050c0c61", 0x8f}, {&(0x7f0000000340)="07afda0a97dfbb89ec12843c748a0a48c386704c3abd9074d74590bff8856b9bee82579d76ea9052b0f57f36cfb08f13ab7cd3a7c4ef5371186f0277b9e5c7f4e9d68fa3749169cd6da1d5f86c9854c574fe2b817992f5d325c87a4f54bbe95645984b2182d17c8ee7eb89eaa3d4e252499e51177b074ed16ae9099c134caac979ccb0fbeb25218b8466b3b9198002f9ce39f3c4a0b75b4877afeb62fad3c40172440fd79c", 0xa5}], 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x2378}, 0xc080) write$cgroup_pid(r7, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 503.366382][T20030] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 503.374361][T20030] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf17e46d4 [ 503.382323][T20030] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff [ 503.409034][T20034] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 19:55:45 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:45 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:45 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:45 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf040eb0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 503.580653][T20033] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 503.679928][T20051] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 503.702004][T20051] CPU: 1 PID: 20051 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 503.709932][T20051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.720030][T20051] Call Trace: [ 503.723341][T20051] dump_stack+0x172/0x1f0 [ 503.727695][T20051] sysfs_warn_dup.cold+0x1c/0x31 [ 503.732654][T20051] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 503.738758][T20051] sysfs_create_link+0x65/0xc0 [ 503.743543][T20051] device_add+0x75c/0x17a0 [ 503.747969][T20051] ? mark_lock+0xc2/0x1220 [ 503.752403][T20051] ? uevent_show+0x370/0x370 [ 503.757000][T20051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.763277][T20051] wiphy_register+0x1c46/0x2720 [ 503.768158][T20051] ? wiphy_unregister+0x1040/0x1040 [ 503.773379][T20051] ? __kmalloc+0x608/0x770 [ 503.777801][T20051] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 503.783620][T20051] ? lockdep_hardirqs_on+0x421/0x5e0 [ 503.788927][T20051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.795189][T20051] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 503.800835][T20051] ieee80211_register_hw+0x157e/0x3ac0 [ 503.806319][T20051] ? ieee80211_ifa_changed+0xde0/0xde0 [ 503.811791][T20051] ? memset+0x32/0x40 [ 503.815782][T20051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.822032][T20051] ? __hrtimer_init+0x13d/0x280 [ 503.826905][T20051] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 503.832661][T20051] ? __kasan_check_read+0x11/0x20 [ 503.837716][T20051] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 503.844149][T20051] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 503.850068][T20051] hwsim_new_radio_nl+0x9e3/0x1070 [ 503.855201][T20051] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 503.861125][T20051] ? nla_memcpy+0xb0/0xb0 [ 503.868083][T20051] ? __nla_parse+0x43/0x60 [ 503.872526][T20051] genl_family_rcv_msg+0x74b/0xf90 [ 503.877671][T20051] ? genl_unregister_family+0x7b0/0x7b0 [ 503.883237][T20051] ? __kasan_check_read+0x11/0x20 [ 503.888451][T20051] ? __lock_acquire+0x16f2/0x4a00 [ 503.894008][T20051] ? __dev_queue_xmit+0xbb5/0x3720 [ 503.899158][T20051] genl_rcv_msg+0xca/0x170 [ 503.903594][T20051] netlink_rcv_skb+0x177/0x450 [ 503.908370][T20051] ? genl_family_rcv_msg+0xf90/0xf90 [ 503.913672][T20051] ? netlink_ack+0xb50/0xb50 [ 503.918283][T20051] ? __kasan_check_write+0x14/0x20 [ 503.923418][T20051] ? netlink_deliver_tap+0x254/0xbf0 [ 503.928714][T20051] genl_rcv+0x29/0x40 [ 503.932687][T20051] netlink_unicast+0x531/0x710 [ 503.937438][T20051] ? netlink_attachskb+0x7c0/0x7c0 [ 503.942534][T20051] ? _copy_from_iter_full+0x25d/0x8c0 [ 503.947891][T20051] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 503.953598][T20051] ? __check_object_size+0x3d/0x437 [ 503.958784][T20051] netlink_sendmsg+0x8a5/0xd60 [ 503.963536][T20051] ? netlink_unicast+0x710/0x710 [ 503.968466][T20051] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 503.973999][T20051] ? apparmor_socket_sendmsg+0x2a/0x30 [ 503.979443][T20051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.985665][T20051] ? security_socket_sendmsg+0x8d/0xc0 [ 503.991108][T20051] ? netlink_unicast+0x710/0x710 [ 503.996031][T20051] sock_sendmsg+0xd7/0x130 [ 504.000465][T20051] ___sys_sendmsg+0x803/0x920 [ 504.005168][T20051] ? copy_msghdr_from_user+0x440/0x440 [ 504.010644][T20051] ? __kasan_check_read+0x11/0x20 [ 504.015687][T20051] ? __fget+0x384/0x560 [ 504.019847][T20051] ? ksys_dup3+0x3e0/0x3e0 [ 504.024254][T20051] ? __fget_light+0x1a9/0x230 [ 504.028916][T20051] ? __fdget+0x1b/0x20 [ 504.032969][T20051] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 504.039197][T20051] __sys_sendmsg+0x105/0x1d0 [ 504.043791][T20051] ? __sys_sendmsg_sock+0xd0/0xd0 [ 504.048809][T20051] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 504.054353][T20051] ? do_syscall_64+0x26/0x760 [ 504.059044][T20051] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.065225][T20051] ? do_syscall_64+0x26/0x760 [ 504.069905][T20051] __x64_sys_sendmsg+0x78/0xb0 [ 504.074747][T20051] do_syscall_64+0xfa/0x760 [ 504.079235][T20051] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.085110][T20051] RIP: 0033:0x459a59 [ 504.088994][T20051] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 504.108577][T20051] RSP: 002b:00007f4bf17e3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 504.116969][T20051] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 19:55:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb5a001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 504.124933][T20051] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 504.132885][T20051] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 504.140851][T20051] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf17e46d4 [ 504.148806][T20051] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff [ 504.265242][T20063] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 19:55:46 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0448b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb71001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 504.460395][T20070] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 504.487589][T20070] CPU: 0 PID: 20070 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 504.495656][T20070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.505709][T20070] Call Trace: [ 504.509031][T20070] dump_stack+0x172/0x1f0 [ 504.513379][T20070] sysfs_warn_dup.cold+0x1c/0x31 [ 504.518313][T20070] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 504.524396][T20070] sysfs_create_link+0x65/0xc0 [ 504.529172][T20070] device_add+0x75c/0x17a0 [ 504.533584][T20070] ? mark_lock+0xc2/0x1220 [ 504.538076][T20070] ? uevent_show+0x370/0x370 [ 504.542652][T20070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 504.548896][T20070] wiphy_register+0x1c46/0x2720 [ 504.553762][T20070] ? wiphy_unregister+0x1040/0x1040 [ 504.558959][T20070] ? __kmalloc+0x608/0x770 [ 504.563381][T20070] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 504.569191][T20070] ? lockdep_hardirqs_on+0x421/0x5e0 [ 504.574479][T20070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 504.580723][T20070] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 504.586380][T20070] ieee80211_register_hw+0x157e/0x3ac0 [ 504.591859][T20070] ? ieee80211_ifa_changed+0xde0/0xde0 [ 504.597320][T20070] ? memset+0x32/0x40 [ 504.601314][T20070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 504.607540][T20070] ? __hrtimer_init+0x13d/0x280 [ 504.612387][T20070] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 504.618101][T20070] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 504.624515][T20070] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 504.630411][T20070] hwsim_new_radio_nl+0x9e3/0x1070 [ 504.635517][T20070] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 504.641409][T20070] ? nla_memcpy+0xb0/0xb0 [ 504.645742][T20070] ? __nla_parse+0x43/0x60 [ 504.650168][T20070] genl_family_rcv_msg+0x74b/0xf90 [ 504.655305][T20070] ? genl_unregister_family+0x7b0/0x7b0 [ 504.660870][T20070] ? __kasan_check_read+0x11/0x20 [ 504.665903][T20070] ? __lock_acquire+0x16f2/0x4a00 [ 504.670937][T20070] ? __dev_queue_xmit+0xbb5/0x3720 [ 504.676087][T20070] genl_rcv_msg+0xca/0x170 [ 504.680511][T20070] netlink_rcv_skb+0x177/0x450 [ 504.685287][T20070] ? genl_family_rcv_msg+0xf90/0xf90 [ 504.690576][T20070] ? netlink_ack+0xb50/0xb50 [ 504.695180][T20070] ? __kasan_check_write+0x14/0x20 [ 504.700298][T20070] ? netlink_deliver_tap+0x254/0xbf0 [ 504.705710][T20070] genl_rcv+0x29/0x40 [ 504.709706][T20070] netlink_unicast+0x531/0x710 [ 504.714489][T20070] ? netlink_attachskb+0x7c0/0x7c0 [ 504.719622][T20070] ? _copy_from_iter_full+0x25d/0x8c0 [ 504.725011][T20070] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 504.730744][T20070] ? __check_object_size+0x3d/0x437 [ 504.735967][T20070] netlink_sendmsg+0x8a5/0xd60 [ 504.740752][T20070] ? netlink_unicast+0x710/0x710 [ 504.745707][T20070] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 504.751275][T20070] ? apparmor_socket_sendmsg+0x2a/0x30 19:55:47 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:47 executing program 1: r0 = socket$kcm(0x2b, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 504.756755][T20070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 504.763012][T20070] ? security_socket_sendmsg+0x8d/0xc0 [ 504.768484][T20070] ? netlink_unicast+0x710/0x710 [ 504.773466][T20070] sock_sendmsg+0xd7/0x130 [ 504.777905][T20070] ___sys_sendmsg+0x803/0x920 [ 504.782624][T20070] ? copy_msghdr_from_user+0x440/0x440 [ 504.788106][T20070] ? __kasan_check_read+0x11/0x20 [ 504.793174][T20070] ? __fget+0x384/0x560 [ 504.797362][T20070] ? ksys_dup3+0x3e0/0x3e0 [ 504.801796][T20070] ? __fget_light+0x1a9/0x230 [ 504.806481][T20070] ? __fdget+0x1b/0x20 [ 504.810560][T20070] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 504.816825][T20070] __sys_sendmsg+0x105/0x1d0 [ 504.821423][T20070] ? __sys_sendmsg_sock+0xd0/0xd0 [ 504.826479][T20070] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 504.831954][T20070] ? do_syscall_64+0x26/0x760 [ 504.836648][T20070] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.842732][T20070] ? do_syscall_64+0x26/0x760 [ 504.847435][T20070] __x64_sys_sendmsg+0x78/0xb0 [ 504.852215][T20070] do_syscall_64+0xfa/0x760 19:55:47 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:47 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) [ 504.856735][T20070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.862636][T20070] RIP: 0033:0x459a59 [ 504.866536][T20070] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 504.886155][T20070] RSP: 002b:00007f4bf17e3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 504.894612][T20070] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 504.902616][T20070] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 19:55:47 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 504.902626][T20070] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 504.902633][T20070] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf17e46d4 [ 504.902641][T20070] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:47 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb00581800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:47 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf044cb0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:47 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 505.236081][T20098] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 19:55:47 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:47 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 505.412584][T20102] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 505.420707][T20102] CPU: 0 PID: 20102 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 505.428597][T20102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.438661][T20102] Call Trace: [ 505.441968][T20102] dump_stack+0x172/0x1f0 [ 505.446320][T20102] sysfs_warn_dup.cold+0x1c/0x31 [ 505.451278][T20102] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 505.457370][T20102] sysfs_create_link+0x65/0xc0 [ 505.462157][T20102] device_add+0x75c/0x17a0 [ 505.466587][T20102] ? mark_lock+0xc2/0x1220 [ 505.471017][T20102] ? uevent_show+0x370/0x370 [ 505.475626][T20102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 505.481895][T20102] wiphy_register+0x1c46/0x2720 [ 505.486775][T20102] ? wiphy_unregister+0x1040/0x1040 [ 505.492014][T20102] ? __kmalloc+0x608/0x770 [ 505.496454][T20102] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 505.502279][T20102] ? lockdep_hardirqs_on+0x421/0x5e0 [ 505.507588][T20102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 505.513843][T20102] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 505.519501][T20102] ieee80211_register_hw+0x157e/0x3ac0 [ 505.524990][T20102] ? ieee80211_ifa_changed+0xde0/0xde0 [ 505.530466][T20102] ? memset+0x32/0x40 [ 505.534465][T20102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 505.540723][T20102] ? __hrtimer_init+0x13d/0x280 [ 505.545608][T20102] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 505.551343][T20102] ? __kasan_check_read+0x11/0x20 [ 505.556397][T20102] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 505.562837][T20102] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 505.568749][T20102] hwsim_new_radio_nl+0x9e3/0x1070 [ 505.573884][T20102] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 505.579797][T20102] ? nla_memcpy+0xb0/0xb0 [ 505.584172][T20102] ? __nla_parse+0x43/0x60 [ 505.588618][T20102] genl_family_rcv_msg+0x74b/0xf90 [ 505.593754][T20102] ? genl_unregister_family+0x7b0/0x7b0 [ 505.599316][T20102] ? __kasan_check_read+0x11/0x20 [ 505.604361][T20102] ? __lock_acquire+0x16f2/0x4a00 [ 505.609411][T20102] ? __dev_queue_xmit+0xbb5/0x3720 [ 505.614553][T20102] genl_rcv_msg+0xca/0x170 [ 505.618960][T20102] netlink_rcv_skb+0x177/0x450 [ 505.623731][T20102] ? genl_family_rcv_msg+0xf90/0xf90 [ 505.629001][T20102] ? netlink_ack+0xb50/0xb50 [ 505.633576][T20102] ? __kasan_check_write+0x14/0x20 [ 505.638679][T20102] ? netlink_deliver_tap+0x254/0xbf0 [ 505.643949][T20102] genl_rcv+0x29/0x40 [ 505.647917][T20102] netlink_unicast+0x531/0x710 [ 505.652678][T20102] ? netlink_attachskb+0x7c0/0x7c0 [ 505.657773][T20102] ? _copy_from_iter_full+0x25d/0x8c0 [ 505.663136][T20102] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 505.668838][T20102] ? __check_object_size+0x3d/0x437 [ 505.674033][T20102] netlink_sendmsg+0x8a5/0xd60 [ 505.678792][T20102] ? netlink_unicast+0x710/0x710 [ 505.683720][T20102] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 505.689250][T20102] ? apparmor_socket_sendmsg+0x2a/0x30 [ 505.694692][T20102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 505.700924][T20102] ? security_socket_sendmsg+0x8d/0xc0 [ 505.706372][T20102] ? netlink_unicast+0x710/0x710 [ 505.711295][T20102] sock_sendmsg+0xd7/0x130 [ 505.715699][T20102] ___sys_sendmsg+0x803/0x920 [ 505.720362][T20102] ? copy_msghdr_from_user+0x440/0x440 [ 505.725808][T20102] ? __kasan_check_read+0x11/0x20 [ 505.730819][T20102] ? __fget+0x384/0x560 [ 505.734962][T20102] ? ksys_dup3+0x3e0/0x3e0 [ 505.739367][T20102] ? __fget_light+0x1a9/0x230 [ 505.744026][T20102] ? __fdget+0x1b/0x20 [ 505.748087][T20102] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 505.754314][T20102] __sys_sendmsg+0x105/0x1d0 [ 505.758896][T20102] ? __sys_sendmsg_sock+0xd0/0xd0 [ 505.763914][T20102] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 505.769353][T20102] ? do_syscall_64+0x26/0x760 [ 505.774024][T20102] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 505.780072][T20102] ? do_syscall_64+0x26/0x760 [ 505.784734][T20102] __x64_sys_sendmsg+0x78/0xb0 [ 505.789489][T20102] do_syscall_64+0xfa/0x760 [ 505.793980][T20102] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 505.799853][T20102] RIP: 0033:0x459a59 [ 505.803732][T20102] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 505.823329][T20102] RSP: 002b:00007f4bf17e3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 505.831754][T20102] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 505.839728][T20102] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 505.847692][T20102] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 505.855646][T20102] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf17e46d4 19:55:48 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 505.863608][T20102] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb005a1800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:48 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x9, 0x40, 0x1, 0x0, 0x0, 0x862, 0xf, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x6, @perf_config_ext={0x100000000, 0x81}, 0x9000, 0xff, 0x1, 0x7, 0x9, 0x9, 0x80}, r0, 0x4, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000180)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:48 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(0x0, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:48 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:48 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0460b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 506.247145][T20126] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 506.447900][T20138] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 506.481320][T20138] CPU: 0 PID: 20138 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 506.489252][T20138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 506.499323][T20138] Call Trace: [ 506.502644][T20138] dump_stack+0x172/0x1f0 [ 506.506982][T20138] sysfs_warn_dup.cold+0x1c/0x31 [ 506.511925][T20138] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 506.511942][T20138] sysfs_create_link+0x65/0xc0 [ 506.511957][T20138] device_add+0x75c/0x17a0 [ 506.511974][T20138] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 506.511990][T20138] ? uevent_show+0x370/0x370 [ 506.512011][T20138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 506.543493][T20138] wiphy_register+0x1c46/0x2720 [ 506.548376][T20138] ? wiphy_unregister+0x1040/0x1040 [ 506.553599][T20138] ? __kmalloc+0x608/0x770 [ 506.558016][T20138] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 506.563835][T20138] ? lockdep_hardirqs_on+0x421/0x5e0 [ 506.569135][T20138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 506.575384][T20138] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 506.581063][T20138] ieee80211_register_hw+0x157e/0x3ac0 [ 506.586549][T20138] ? ieee80211_ifa_changed+0xde0/0xde0 [ 506.592028][T20138] ? memset+0x32/0x40 [ 506.596017][T20138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 506.602267][T20138] ? __hrtimer_init+0x13d/0x280 [ 506.607149][T20138] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 506.612884][T20138] ? __kasan_check_read+0x11/0x20 [ 506.617964][T20138] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 506.624404][T20138] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 506.630321][T20138] hwsim_new_radio_nl+0x9e3/0x1070 [ 506.635457][T20138] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 506.641363][T20138] ? nla_memcpy+0xb0/0xb0 [ 506.645731][T20138] ? __nla_parse+0x43/0x60 [ 506.650170][T20138] genl_family_rcv_msg+0x74b/0xf90 [ 506.655300][T20138] ? genl_unregister_family+0x7b0/0x7b0 [ 506.660855][T20138] ? __kasan_check_read+0x11/0x20 [ 506.665891][T20138] ? __lock_acquire+0x16f2/0x4a00 [ 506.670929][T20138] ? __dev_queue_xmit+0xbb5/0x3720 [ 506.676077][T20138] genl_rcv_msg+0xca/0x170 [ 506.680510][T20138] netlink_rcv_skb+0x177/0x450 [ 506.685285][T20138] ? genl_family_rcv_msg+0xf90/0xf90 [ 506.690573][T20138] ? netlink_ack+0xb50/0xb50 [ 506.695174][T20138] ? __kasan_check_write+0x14/0x20 [ 506.695193][T20138] ? netlink_deliver_tap+0x254/0xbf0 [ 506.695213][T20138] genl_rcv+0x29/0x40 [ 506.695232][T20138] netlink_unicast+0x531/0x710 [ 506.714345][T20138] ? netlink_attachskb+0x7c0/0x7c0 [ 506.719476][T20138] ? _copy_from_iter_full+0x25d/0x8c0 [ 506.724867][T20138] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 506.730604][T20138] ? __check_object_size+0x3d/0x437 [ 506.735822][T20138] netlink_sendmsg+0x8a5/0xd60 [ 506.740608][T20138] ? netlink_unicast+0x710/0x710 [ 506.745558][T20138] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 506.751125][T20138] ? apparmor_socket_sendmsg+0x2a/0x30 [ 506.756607][T20138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 506.762894][T20138] ? security_socket_sendmsg+0x8d/0xc0 [ 506.768381][T20138] ? netlink_unicast+0x710/0x710 [ 506.773341][T20138] sock_sendmsg+0xd7/0x130 [ 506.777780][T20138] ___sys_sendmsg+0x803/0x920 [ 506.782482][T20138] ? copy_msghdr_from_user+0x440/0x440 [ 506.787969][T20138] ? __kasan_check_read+0x11/0x20 [ 506.793019][T20138] ? __fget+0x384/0x560 [ 506.797199][T20138] ? ksys_dup3+0x3e0/0x3e0 [ 506.801644][T20138] ? __fget_light+0x1a9/0x230 [ 506.806336][T20138] ? __fdget+0x1b/0x20 [ 506.810426][T20138] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 506.816688][T20138] __sys_sendmsg+0x105/0x1d0 [ 506.821300][T20138] ? __sys_sendmsg_sock+0xd0/0xd0 [ 506.826362][T20138] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 506.831845][T20138] ? do_syscall_64+0x26/0x760 [ 506.836539][T20138] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 506.842629][T20138] ? do_syscall_64+0x26/0x760 [ 506.847327][T20138] __x64_sys_sendmsg+0x78/0xb0 [ 506.852190][T20138] do_syscall_64+0xfa/0x760 [ 506.856718][T20138] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 506.862625][T20138] RIP: 0033:0x459a59 [ 506.866533][T20138] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 506.886146][T20138] RSP: 002b:00007f4bf17e3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 19:55:48 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:49 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(0x0, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:49 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(0x0, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:49 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r4, 0x0, 0x5}, 0x3c) openat$cgroup_type(r4, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r4, 0x0) write$cgroup_subtree(r4, &(0x7f0000000040)={[{0x2b, 'rdma'}, {0x2d, 'memory'}, {0x6, 'cpu'}, {0x2d, 'cpu'}, {0x53, 'io'}, {0x2d, 'memory'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x31) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 506.894574][T20138] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 506.902561][T20138] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 506.910544][T20138] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 506.918556][T20138] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf17e46d4 [ 506.926563][T20138] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:49 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:49 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb00711800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:49 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0468b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 507.187395][T20174] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 19:55:49 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:49 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 507.322640][T20176] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 507.339532][T20176] CPU: 1 PID: 20176 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 507.347467][T20176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 507.357532][T20176] Call Trace: [ 507.360842][T20176] dump_stack+0x172/0x1f0 [ 507.365213][T20176] sysfs_warn_dup.cold+0x1c/0x31 [ 507.370182][T20176] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 507.376300][T20176] sysfs_create_link+0x65/0xc0 [ 507.381112][T20176] device_add+0x75c/0x17a0 [ 507.385554][T20176] ? uevent_show+0x370/0x370 [ 507.390170][T20176] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 507.396438][T20176] wiphy_register+0x1c46/0x2720 [ 507.401318][T20176] ? wiphy_unregister+0x1040/0x1040 [ 507.406541][T20176] ? __kmalloc+0x608/0x770 [ 507.410980][T20176] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 507.416805][T20176] ? lockdep_hardirqs_on+0x421/0x5e0 [ 507.422110][T20176] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 507.428367][T20176] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 507.434019][T20176] ieee80211_register_hw+0x157e/0x3ac0 [ 507.439524][T20176] ? ieee80211_ifa_changed+0xde0/0xde0 [ 507.445001][T20176] ? memset+0x32/0x40 [ 507.448997][T20176] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 507.455229][T20176] ? __hrtimer_init+0x13d/0x280 [ 507.460070][T20176] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 507.465771][T20176] ? __kasan_check_read+0x11/0x20 [ 507.470787][T20176] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 507.477186][T20176] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 507.483072][T20176] hwsim_new_radio_nl+0x9e3/0x1070 [ 507.488172][T20176] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 507.494056][T20176] ? nla_memcpy+0xb0/0xb0 [ 507.498384][T20176] ? __nla_parse+0x43/0x60 [ 507.502788][T20176] genl_family_rcv_msg+0x74b/0xf90 [ 507.507888][T20176] ? genl_unregister_family+0x7b0/0x7b0 [ 507.513444][T20176] ? __kasan_check_read+0x11/0x20 [ 507.518452][T20176] ? __lock_acquire+0x16f2/0x4a00 [ 507.523460][T20176] ? __dev_queue_xmit+0xbb5/0x3720 [ 507.528665][T20176] genl_rcv_msg+0xca/0x170 [ 507.533070][T20176] netlink_rcv_skb+0x177/0x450 [ 507.537828][T20176] ? genl_family_rcv_msg+0xf90/0xf90 [ 507.543099][T20176] ? netlink_ack+0xb50/0xb50 [ 507.547674][T20176] ? __kasan_check_write+0x14/0x20 [ 507.552770][T20176] ? netlink_deliver_tap+0x254/0xbf0 [ 507.558047][T20176] genl_rcv+0x29/0x40 [ 507.562009][T20176] netlink_unicast+0x531/0x710 [ 507.566758][T20176] ? netlink_attachskb+0x7c0/0x7c0 [ 507.571850][T20176] ? _copy_from_iter_full+0x25d/0x8c0 [ 507.577214][T20176] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 507.582914][T20176] ? __check_object_size+0x3d/0x437 [ 507.588098][T20176] netlink_sendmsg+0x8a5/0xd60 [ 507.592848][T20176] ? netlink_unicast+0x710/0x710 [ 507.597794][T20176] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 507.603324][T20176] ? apparmor_socket_sendmsg+0x2a/0x30 [ 507.608775][T20176] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 507.614998][T20176] ? security_socket_sendmsg+0x8d/0xc0 [ 507.620441][T20176] ? netlink_unicast+0x710/0x710 [ 507.625361][T20176] sock_sendmsg+0xd7/0x130 [ 507.629767][T20176] ___sys_sendmsg+0x803/0x920 [ 507.634429][T20176] ? copy_msghdr_from_user+0x440/0x440 [ 507.639882][T20176] ? __kasan_check_read+0x11/0x20 [ 507.644892][T20176] ? __fget+0x384/0x560 [ 507.649033][T20176] ? ksys_dup3+0x3e0/0x3e0 [ 507.653437][T20176] ? __fget_light+0x1a9/0x230 [ 507.658102][T20176] ? __fdget+0x1b/0x20 [ 507.662168][T20176] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 507.668395][T20176] __sys_sendmsg+0x105/0x1d0 [ 507.672978][T20176] ? __sys_sendmsg_sock+0xd0/0xd0 [ 507.677994][T20176] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 507.683449][T20176] ? do_syscall_64+0x26/0x760 [ 507.688111][T20176] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 507.694166][T20176] ? do_syscall_64+0x26/0x760 [ 507.698838][T20176] __x64_sys_sendmsg+0x78/0xb0 [ 507.703595][T20176] do_syscall_64+0xfa/0x760 [ 507.708083][T20176] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 507.714044][T20176] RIP: 0033:0x459a59 [ 507.717934][T20176] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 507.737528][T20176] RSP: 002b:00007f4bf17e3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 507.745920][T20176] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 507.753872][T20176] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 507.761826][T20176] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 507.769778][T20176] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf17e46d4 [ 507.777740][T20176] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:50 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04001100160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:50 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:50 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000001500)={&(0x7f0000000040)=@ethernet, 0x80, &(0x7f0000000240)=[{&(0x7f0000000180)="17eefeff3f252914275713b51740e51fe2e3aaa2cd203ce9e16eddba390be65ff898a888016a829fc30430d1324d1c6a5b03df4dae493e41817913d45b78327b770b2ce30e0f8d52c28cd234dbeeee395242b46e39d1ba2eceec3e82325ada3a26fc267bf40a281b2c0209fc8e53b6fa11ffe0", 0x73}, {&(0x7f0000000100)="512ff3bd02b5b1e7dc5141c0b83c78b6daf89c97eafe6c4ae8efac7a421900ef6bdbfc045956f121f76e637a3ed351ec232c34f4e7130f1f", 0x38}, {&(0x7f0000000200)="323f3d3a9359a2748d2b7312dfc34709871eac6ccffed0", 0x17}], 0x3, &(0x7f0000000280)=[{0x1010, 0x112, 0x3, "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"}, {0x20, 0x110, 0x1, "3fb97fcffe488edf884f9bca2f"}, {0x68, 0xbf6c5146a3d3c071, 0x80000001, "6de3d6d174418c72922d7a396c70df7f5f4b6b3cabfecae3e6588d4cdd5cbef713628b4ac18cc6606a5aa117fc7deb95b2dfedc32a15a9698374e0c3647bdc80f5b0146957168783367de3d49774bd40c2ee33"}, {0x88, 0x116, 0x3, "114bdb9d0f7fa2b2d161ff836f878b8dc94c02d2edc727b075c6f87362cdd69275856abec2b92e8b443de2492aafa93ad3b18f934b6955bffac5f837e80c599940bab1c7a71db18728d03bf3a31ac3f9c1f1c56b9a8aea7a83dc807b445adb6bd49c23ff1843e357109eca53a9df1346458fb6"}, {0x78, 0x118, 0x4, "fb7d63003862afcbcf4bfd15787656d00feb7f075ba1e0059784524c77081e705a39b80bdf3edf38a659b8d7c797fe33c8238d700686a27d79aae96e36020ce6fd5fd90bdcad57914bcc3fe298700f9cb1b42284a0ac632cd46c41a50756f1eb539f5d83451b81d7"}, {0xc8, 0xff, 0xcc9, "6fac766d7b349aa2d9e67a457e84ce44e6723b2702489fbde5e963e957f23dc2512f383b819b5a9d1119ecbf7160e633c059f6c790172a691f6c746172c860cbf43d354cd7b15f6ff0ee28edbffcb6a69a58e6f992fafd33c59e5c4ddcb15b61c7fdafea74b10d917e5bd2de6282c13a64057e1495c98dfef73aadf1fa69bdf076392474190699986442a892eac9b7ab9fa3b02630a4ab764e8c440b713cf0d156ef007423f146ba85bc07c7eeff638db43f2f48"}], 0x1260}, 0x10080004) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001540)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r5, &(0x7f00000000c0), 0x12) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) r6 = socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f0000000040)=r5, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0x0) write$cgroup_subtree(r5, &(0x7f00000015c0)={[{0x2d, 'pids'}, {0x0, 'rdma'}, {0x2d, 'cpu'}, {0x2b, 'pids'}, {0x2b, 'cpu'}, {0x2d, 'rdma'}, {0x2b, 'pids'}, {0x16, 'cpu'}, {0x2b, 'memory'}, {0x2b, 'cpu'}]}, 0x3a) openat$cgroup_ro(r4, &(0x7f0000001580)='cgroup.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:50 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf046cb0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04021800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:50 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:50 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04001100160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 508.348342][T20215] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 508.387389][T20215] CPU: 0 PID: 20215 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 508.395346][T20215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.405407][T20215] Call Trace: [ 508.408712][T20215] dump_stack+0x172/0x1f0 [ 508.413063][T20215] sysfs_warn_dup.cold+0x1c/0x31 [ 508.418009][T20215] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 508.424090][T20215] sysfs_create_link+0x65/0xc0 [ 508.428863][T20215] device_add+0x75c/0x17a0 [ 508.433288][T20215] ? mark_lock+0xc2/0x1220 [ 508.437711][T20215] ? uevent_show+0x370/0x370 [ 508.442305][T20215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 508.448560][T20215] wiphy_register+0x1c46/0x2720 [ 508.453408][T20215] ? wiphy_unregister+0x1040/0x1040 [ 508.458593][T20215] ? __kmalloc+0x608/0x770 [ 508.462992][T20215] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 508.468782][T20215] ? lockdep_hardirqs_on+0x421/0x5e0 [ 508.474051][T20215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 508.480272][T20215] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 508.485890][T20215] ieee80211_register_hw+0x157e/0x3ac0 [ 508.491339][T20215] ? ieee80211_ifa_changed+0xde0/0xde0 [ 508.496797][T20215] ? memset+0x32/0x40 [ 508.500765][T20215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 508.506987][T20215] ? __hrtimer_init+0x13d/0x280 [ 508.511828][T20215] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 508.517538][T20215] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 508.523937][T20215] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 508.529814][T20215] hwsim_new_radio_nl+0x9e3/0x1070 [ 508.534919][T20215] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 508.540811][T20215] ? nla_memcpy+0xb0/0xb0 [ 508.545146][T20215] ? __nla_parse+0x43/0x60 [ 508.549563][T20215] genl_family_rcv_msg+0x74b/0xf90 [ 508.554665][T20215] ? genl_unregister_family+0x7b0/0x7b0 [ 508.560192][T20215] ? __kasan_check_read+0x11/0x20 [ 508.565200][T20215] ? __lock_acquire+0x16f2/0x4a00 [ 508.570204][T20215] ? __dev_queue_xmit+0xbb5/0x3720 [ 508.575320][T20215] genl_rcv_msg+0xca/0x170 [ 508.579724][T20215] netlink_rcv_skb+0x177/0x450 [ 508.584473][T20215] ? genl_family_rcv_msg+0xf90/0xf90 [ 508.589746][T20215] ? netlink_ack+0xb50/0xb50 [ 508.594323][T20215] ? __kasan_check_write+0x14/0x20 [ 508.599421][T20215] ? netlink_deliver_tap+0x254/0xbf0 [ 508.604692][T20215] genl_rcv+0x29/0x40 [ 508.608656][T20215] netlink_unicast+0x531/0x710 [ 508.613406][T20215] ? netlink_attachskb+0x7c0/0x7c0 [ 508.618500][T20215] ? _copy_from_iter_full+0x25d/0x8c0 [ 508.623859][T20215] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 508.629569][T20215] ? __check_object_size+0x3d/0x437 [ 508.634756][T20215] netlink_sendmsg+0x8a5/0xd60 [ 508.639507][T20215] ? netlink_unicast+0x710/0x710 [ 508.644436][T20215] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 508.649968][T20215] ? apparmor_socket_sendmsg+0x2a/0x30 [ 508.655411][T20215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 508.661632][T20215] ? security_socket_sendmsg+0x8d/0xc0 [ 508.667074][T20215] ? netlink_unicast+0x710/0x710 [ 508.671994][T20215] sock_sendmsg+0xd7/0x130 [ 508.676394][T20215] ___sys_sendmsg+0x803/0x920 [ 508.681054][T20215] ? copy_msghdr_from_user+0x440/0x440 [ 508.686501][T20215] ? __kasan_check_read+0x11/0x20 [ 508.691513][T20215] ? __fget+0x384/0x560 [ 508.695664][T20215] ? ksys_dup3+0x3e0/0x3e0 [ 508.700077][T20215] ? __fget_light+0x1a9/0x230 [ 508.704738][T20215] ? __fdget+0x1b/0x20 [ 508.708790][T20215] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 508.715014][T20215] __sys_sendmsg+0x105/0x1d0 [ 508.719590][T20215] ? __sys_sendmsg_sock+0xd0/0xd0 [ 508.724608][T20215] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 508.730056][T20215] ? do_syscall_64+0x26/0x760 [ 508.734716][T20215] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 508.740768][T20215] ? do_syscall_64+0x26/0x760 [ 508.745432][T20215] __x64_sys_sendmsg+0x78/0xb0 [ 508.750184][T20215] do_syscall_64+0xfa/0x760 [ 508.754673][T20215] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 508.760550][T20215] RIP: 0033:0x459a59 [ 508.764430][T20215] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 508.784029][T20215] RSP: 002b:00007f4bf17c2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 508.792429][T20215] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 508.800381][T20215] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 508.808333][T20215] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 508.816287][T20215] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf17c36d4 [ 508.824239][T20215] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff [ 508.899795][T20214] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 19:55:51 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:51 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0474b0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:51 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:51 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04031800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 509.160041][T20231] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 509.209850][T20231] CPU: 0 PID: 20231 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 509.217790][T20231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 509.227857][T20231] Call Trace: [ 509.231164][T20231] dump_stack+0x172/0x1f0 [ 509.235512][T20231] sysfs_warn_dup.cold+0x1c/0x31 [ 509.240467][T20231] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 509.246560][T20231] sysfs_create_link+0x65/0xc0 [ 509.251346][T20231] device_add+0x75c/0x17a0 [ 509.255770][T20231] ? mark_lock+0xc2/0x1220 [ 509.260199][T20231] ? uevent_show+0x370/0x370 [ 509.264799][T20231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 509.271063][T20231] wiphy_register+0x1c46/0x2720 [ 509.275949][T20231] ? wiphy_unregister+0x1040/0x1040 [ 509.281167][T20231] ? __kmalloc+0x608/0x770 [ 509.285595][T20231] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 509.291420][T20231] ? lockdep_hardirqs_on+0x421/0x5e0 [ 509.296722][T20231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 509.302971][T20231] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 509.308626][T20231] ieee80211_register_hw+0x157e/0x3ac0 [ 509.314119][T20231] ? ieee80211_ifa_changed+0xde0/0xde0 [ 509.319589][T20231] ? memset+0x32/0x40 [ 509.323590][T20231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 509.329846][T20231] ? __hrtimer_init+0x13d/0x280 [ 509.334715][T20231] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 509.340487][T20231] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 509.346911][T20231] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 509.352819][T20231] hwsim_new_radio_nl+0x9e3/0x1070 [ 509.357942][T20231] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 509.363847][T20231] ? nla_memcpy+0xb0/0xb0 [ 509.368194][T20231] ? __nla_parse+0x43/0x60 [ 509.372628][T20231] genl_family_rcv_msg+0x74b/0xf90 [ 509.377774][T20231] ? genl_unregister_family+0x7b0/0x7b0 [ 509.383352][T20231] ? __kasan_check_read+0x11/0x20 [ 509.388381][T20231] ? __lock_acquire+0x16f2/0x4a00 [ 509.393411][T20231] ? __dev_queue_xmit+0xbb5/0x3720 [ 509.398563][T20231] genl_rcv_msg+0xca/0x170 [ 509.402995][T20231] netlink_rcv_skb+0x177/0x450 [ 509.407761][T20231] ? genl_family_rcv_msg+0xf90/0xf90 [ 509.413054][T20231] ? netlink_ack+0xb50/0xb50 [ 509.417651][T20231] ? __kasan_check_write+0x14/0x20 [ 509.422779][T20231] ? netlink_deliver_tap+0x254/0xbf0 [ 509.428082][T20231] genl_rcv+0x29/0x40 [ 509.432069][T20231] netlink_unicast+0x531/0x710 [ 509.436842][T20231] ? netlink_attachskb+0x7c0/0x7c0 [ 509.441961][T20231] ? _copy_from_iter_full+0x25d/0x8c0 [ 509.447349][T20231] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 509.453073][T20231] ? __check_object_size+0x3d/0x437 [ 509.458290][T20231] netlink_sendmsg+0x8a5/0xd60 [ 509.463069][T20231] ? netlink_unicast+0x710/0x710 [ 509.468027][T20231] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 509.473584][T20231] ? apparmor_socket_sendmsg+0x2a/0x30 [ 509.479075][T20231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 509.485336][T20231] ? security_socket_sendmsg+0x8d/0xc0 [ 509.490816][T20231] ? netlink_unicast+0x710/0x710 [ 509.495786][T20231] sock_sendmsg+0xd7/0x130 [ 509.500214][T20231] ___sys_sendmsg+0x803/0x920 [ 509.504908][T20231] ? copy_msghdr_from_user+0x440/0x440 [ 509.510390][T20231] ? __kasan_check_read+0x11/0x20 [ 509.515432][T20231] ? __fget+0x384/0x560 [ 509.519613][T20231] ? ksys_dup3+0x3e0/0x3e0 [ 509.524049][T20231] ? __fget_light+0x1a9/0x230 [ 509.528739][T20231] ? __fdget+0x1b/0x20 [ 509.532819][T20231] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 509.539077][T20231] __sys_sendmsg+0x105/0x1d0 [ 509.543680][T20231] ? __sys_sendmsg_sock+0xd0/0xd0 [ 509.548818][T20231] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 509.554297][T20231] ? do_syscall_64+0x26/0x760 [ 509.558990][T20231] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 509.565090][T20231] ? do_syscall_64+0x26/0x760 [ 509.569784][T20231] __x64_sys_sendmsg+0x78/0xb0 [ 509.574557][T20231] do_syscall_64+0xfa/0x760 [ 509.579069][T20231] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 509.584980][T20231] RIP: 0033:0x459a59 [ 509.588877][T20231] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 509.608482][T20231] RSP: 002b:00007f4bf17e3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 509.616919][T20231] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 509.624894][T20231] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 509.632868][T20231] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 509.640860][T20231] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf17e46d4 [ 509.648839][T20231] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:52 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = socket$kcm(0x11, 0x200000000000002, 0x300) r4 = socket$kcm(0x11, 0x10000000003, 0x0) setsockopt$sock_attach_bpf(r3, 0x107, 0x12, &(0x7f00000000c0)=r4, 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='me\x86\xa4\x8a\xd1.erelts\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) [ 509.836371][T20244] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 19:55:52 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf047ab0eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 509.918418][T20237] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 19:55:52 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:52 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = socket$kcm(0x11, 0x200000000000002, 0x300) r4 = socket$kcm(0x11, 0x10000000003, 0x0) setsockopt$sock_attach_bpf(r3, 0x107, 0x12, &(0x7f00000000c0)=r4, 0x4) close(r3) r5 = socket$kcm(0x11, 0x200000000000002, 0x300) r6 = socket$kcm(0x11, 0x10000000003, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0x12, &(0x7f00000000c0)=r6, 0x4) close(r5) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000040)={r5}) sendmsg(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000000180)="e142d72073d8bce82af800f6fd338ff0352742ada15eaf1922744b5d6c6115a118a4843fda0c48e33efb103f626a8b59bdce04dd0227620bc57531b4be904897d0e5faae8c8f518d0c02e7ae5f39d35b0f930517bd059967aae219428b6233cd8e30b60bc1abbcf46fecd3bfacdcf07c71188b447be7c8e6518254970ff84e811e0b6975729b85333e5b27ecc317d5039c16a27df7bbe98080ad5d1347da7777c815acc3704707baf819f4d8183d41f294586ee56ad6d3cb09ed8058ecfc5e38d54110ff62c7a155fe705a34defbaf74dfc62317a0043a079a9f6b6c58633e95130dc5d9e0f2f190959f0f61050b888b73577c6c1f5b968e83a8a1b06842576f0062bb1650ce733709c8359e1378662a19d789d65cd481065d0effdcf2b17a3154c650114a00a1a21f4d1988ed015021019c8cad9205bfe44b8a958d7d60c26d58f3ac8e1ae5d4bbe8486647619829924b54d9df0aea2d35cfa743b08b3e1681685875fe4c4d4f5995aedbb52c19c0f6f73975a4a6d49cc63f8b9587dd49214e43e29eada26076055598a7707668336027b6aef27bea3c229ba7ec8b61b661567563d5bf906106b2f08f354619f3d4c15908eb4af1a4b3e2b5913446ed611f201ad7fedbe93f9d20b3ecb5c6fe0cce10c45053c18f0cb43eccd0574e71da21455cdc21f7033bb860ce6e2043a74e7367452f52e81594b2964a40409532596cb3bc6c241c807042b54d2fe4fe3c8b4f4d7d9eae806d1ad5f450e93a57d14cfc7c23ce3a8f4c7b83dd613760c6731b9aa663c83e27e762038b10948a1fef6a53612b3a6b29fc527c2e25f9862536e18dbef6224040b8b763eae82d8332f387fb0ad522744db8c7d2582ecf9d41e31a2f4ba9aa05175cfb6671cde10c481642bbd89a7c794fb1efb7dbc150cbf7f269a3de1d47bfa1d4056b3b7b874c6600be00034521643a82cc77492582554bc5351270e97b7b93c429c8b1950ad2c1a84dc163f10f14acf6ad9922cf8950e022dedd9138a61b79c2b226efa30783c5bf4d8ded1c2ec6c55d153ff299f4bd1a6547debd5bfe5919b3ecbb380e2b82681d1fc63c7df1f3c2301c4eaaaf3e1959d2744c010b2a518ef2533c4ba2ce88d1fb9bc4248e8e9e11470f6fd364aa1e195280c1db4247e6db9387821d7ccca4b92ab2b1adb429a11e19d8f3992a20f58f2a77f5c7b8a8a78b8493e000d6c6aaee688d508e20b138910f2bee6db21dcb96ab59b115e25ef9d1213acd2f662dab90f25e4c8312f9bc4f18fe9e86bfe769f94a6764bc7427290c5570d3026656dd4858b4d6fcd1c9d6da86a9c05484e1cfadfe2a514b571e016f25b00247f06833e18adbb67ac85f79c7e014825d6071c0feda6943b89d67b4bb809373d8ae64112d29432d2173d753bed939b87b874b78fa2df2adb5a3cb2142af9937db9a86801ed1c69e532031bee97ab99facc844719c5cf2e01f44683ce467e4ff043ce38406baf29466d809053bcd9074f037589587ddcaac8975e24f2d1dfc4d3ca4bcf990f474c61db7643eea164be7508c9d0f4b089e1af6dd0611b7b2cc6f3dda6ab527e9962bb133dcc427fcc6482e2fbac5e67ab7dbce2ccf31a6abe4203e56ed759ce3a7d6d5e41dee454ca5172e67c7f41fab8d05b04b5020a3b21b89af1a490659639dc88ff7df50255ed19ef8fcec7c142ae673cc1e120a8e91ea93a8810714c234fa34266dcc6cba36f70830168eaa17fcb9276025ce76d6c24785503f6cb9d7419641de3416b665aa386e35297a5c0496cd214a69337828c345753303d4b179b82df6f2d70805a30f27e25c5eefd14553e33787cf9cc48213426b35b79a051ae91d56d12f591433910007ce8e8cc4a7e59884cc0cf483c8edf37f17f8bb1d54d46bb7c8b73ba7ad425deee73061d65fd7d231211c117df1d7d184f67c0f062c6bceda97e7d0c942d300771e7cf3c3889b359836dc856ab77b3812ebfdb88bc0813edc6a5ccbe079b51bb884e97506c81da483181ccaf881cdcec294fa0b801fd25c3bb9d9ed6e3a7ca5b4b4cf0fd930d1596580379e6ad4b83fd174bfa6dae5a17b74947e57a419ba805746c64d9ebf1ce6101785679d8ef404276f5ec21e9d75493c395ae11e8fd561cd4538a965033ea653b5055d220cd57d3bd48c06c2b5b86dc9f3143f0dffd2839af914d282b0a30a794e11d8772b54126fd3c591d15c210a5dffe74963a49696a0cba67799e0832dd5f338e31495c605d9b6339fbaeeea12baf8a360b25c01a66f076270b54b4782205b93d97e57467a38886db07fa82676265253dafaf7ab767e4c3aeeab621f4bee1fff24b43027d305b30200fa7e7b2f9c703fe2c03847ef284943923f698a2dc8514cacf9fd7502575c41e306fa3ce3c13b7c5ab40fccb51f4f310a5788bdec5318bfeba42006ebe38e1f8537c3c7fc0a985dfcc6669b016e012f848d549d7d49a163b0fd4ffddabfae333cea8167f2bbf43573adea330c328e3653e2ca2a7af9888a7b85d1aa5e10e78f3e02c9a106364a95568381dd747638c0081aed9b2c3ae7061ece9fe9652c1b012994b7abd831e71b7d93ae225c4386616fa9cd15486a82ce5e1f26eb1ce6e0385f4edb76c40b0a0aef48bece343b02308fa351bb0c5d232b1b8975a276d973dc14e96e793d74f763997d8d7f29d697783ff6d38b5dfef5ee185d0e3a16ab35e740089480751d1d78145746302ea2933fc6a7df17fffca964c2aaae2cc707210560e713d542f6808df4593b5a64ea88be1743decd6e05dd4cfa4c8be051ab9c5e3737c25798833ae9882e78217d0a5f82e30ed3f86032e71dc8b3419fadec6bb9bb440f9379e7a66c432ab36bb55fa9243a040726ea0bd8be2df47ab8f6a02d9ab772b4276534d375f8b502765f13e0f7686fd32206876ee9ff2a3bc1afe935df9beebc680fc0b83faa37881f40acf368a0e9b19dbbefb64eb90c87b24acca248800d1f175282c564ededf487b9621e899e638d82c97a11682dfb1e3b0a09c709f3445cbe84007163381a5bf93c70ee455ec58c78f28c86d0dbc4d1a0eefc9b29499b17dde95de53e52bcf3a4dae252ac81208cc2566956008caa1d4c0ae4d532f9b492f2d1f79f0a171fac549ccf6991bbac2e95f69d8a590c4ba0b693ec57393dbf6954f3c158b846f1f7025f9ee68a0a9a560e45b7835f9eb9554c26300c607c618a0395d072c9dd00fb31c8f730fdf924cf3d5bcb345265419fb6c212a08c2a3541eae7268732733cc12fd845d237f24030a17a7ef4bf1a19bced59ee32662f2c37cf2d9ee56ab066c63c30b018ba6cef8b39b2b023683cfa3463dfefe02f522150a359af242afba33f94e4d803f52b4b379a11da0c40eabe985397a0f15d8b670494b8140f67ebafd992b242c9d023e0e088f86c069031d804c126587217da157064aad9a7046489e72ee3745d0bd217b160476c2c445e78a8108bba1ab2fb5c9650cd607345494a7851870c1465d64b709e50f523bb938cc2232d0fab7e7b2a256c0aed0024d699cbc98c2b65972f104bc752e9b07015552c0eae948526929f1acb2b623097b6e4e984eeba70d3075c7989ff3e3535738c2dc238e9fd90e50cf91233dc5828aca19b03a04ad0b8d00802afefc572817efe1d12da74a4096eb597c925b5677ded933b3af7b97015740224970214bcad1df20673299b6ad3fe7c830421581d6792f065eac388131a335a473bae326e521f755c35341273ba68e0729dcee45005f6ec35f86778985acd5f890b1c26fe0f922771887ce82164bedf49ef49b1abb1c7baf8456d19c012008bb32c5460276010ec3b31fa85bdde18f12f03e20cd1193153ff6272a944b81588de60cbdfc8a1416786835b4e1607aa3309f59ec2585cd6ef86fe941b55094307a317f890bedce9a73abac62854af3346ee35243828022d09f906f0004107461f6170358163bc42d330f469c4ed6a889a4e4a819f494c5420e0ca92a27ab83d13a2efafbe3564744d572ff0f8830e78395df571487eb97376007cb1c1feaea4c5c3dc81a814053643df616b0419ed77fe05ba6874dd9aae1823ce6a599963f8ceb9decf55ab82a832a628fc64153e4f74442f613664e18fe1a5347b064965fa9981ed1bc2a36b1eb2d98fe699dec786052fb6a90190ae755864a13994a28d544919fba06d1ae8acfc1ed7344d481333512f0ddc798b23044f80200afd7be929508c40deef4dbbd7caa797036407d01f1a1d9775da46b4511bfa39c5241e39e88abb0261a5528a34dab1ac570633301fb46c4df19f942365d0d61d2f243327c7e4a735a1517c867ad61984c10ab33d63dd702fd0a9c7ac07bb25b8017d2ac3b5f8389f40a55bdcd916430eda3d21f5e26280adddb0e30bfe3f16e45b558fb31ec401afdf21b9930e9f84af1136e7914dbe91ee3eb140cbea1fc7ce1cdbd72149f08805f99da95126dcdb5cb767ea7e70f2e0edbb287d582344364673cc1ce547522434f5d4b8e3dfacf480a92010b81a9263a7a3833f91ff59edd14857af53c9ab9d31cb66aeaea07bcb8d3ca468a109d74e3a54bdd4add812e6e16048687b6d7b8cdd3f4acbaa996085b5337db8e4c99ced5a242ff443a70dc20e0f9bbed52fa92539bd73e9d8dbc2a47721e689dc19317a05b40d571a452c201fc6181833bcd2e1c1ad1900a40fa102d0a3ed024c18f6e88942726aaeda79388c2e06c2c8c5423d3b0e994a09148d3e80061785d4f6bfedd761990132cc6015d82a2f4765fd857a783e9c8cccb338fadd0caf04c3fa0df926e70723e69c07a674af523d2db0af2ec670a16e839f1b14309309465fbb983b0aa542eafe7107a66eff3120279113e290abf08df2a57b74273ff7da951fa448957c738d2b5ae029a541a8ceb57ddd6ee44fb88975d4debb58d661452652cf6505a5a8005dc7c44936e7d5086170c3b61e8fff407ce07e3ae2457686b8f0b2abee14a42b5a8c3e9501bb7ce2b37d4b8a091dc89b12f6819ca8a8ed6244da5f60cf3a4e215f313f63dd0cc474de26322c1a72cef503166303546c0e2b4c84ebe0bd3a393c04f48fc20dce1ed62b9ca536c678902e427881113bf035d6e2e3e2d9b215554d9b240fc703a525506e5eb2c24f7db323350c7d0c6cde5d60671a6ad26b18d2bff29d8956290140d6cca7a1439b77648e9ebdb68c687f628fa10a21deff6f384e753ec4d315aebdccfb58f4377bb0001fc415b51680ac2027038911c1bf418efc8c32bc5fcf7dcfaaf959205427b635079bcbde903adc283a1c730eccad95908373959badd734ad828e17dbd55fa34efa2739a220019ed154795351b071460d5863c116c5aeaf625bcd0a15e6a0c2cc870b0780be3f21cc35fc45e0f32e8c5d599a6ce353e50057402cf077902b36e9fcc1dbfccda08274667eb5746d81d8467ccd15fd44649cd58a99c811c91f0805e4d5647a44f58a8602a0c88aff5bf66cd3d54f3a9020d7af0b068b091c9726ff2e295ec886e8ea2f026a9fd8b7775cd4ce68622d9cd284f7901c39fb2b80841977ce93a05af916038defc28f2a860de1126817f643ba6e422b55e4485cec99ba4162037d45da2c3491c3bb46cb9915b132eb242a8d40b0f3862589048aff5cce5bafc52c996c7f8292a40652463c2fda1ca3a37153408c1a55ebcba2d53d4f0413228fa9cc40e07a0d3d2753e57aa18d4d6c2edf112032bef8e68d35e15c61d4fffddf353d04a589f77b7152aa62144ff8e1ec302600e7ef81b3dab4c442e616d32d79283c2946457e93fc567d35d33646", 0x1000}, {&(0x7f0000001180)="33b4768ad6d6416c92fd8118c35c4c50e08ada238d7b4b7300ddc3335f7014fa7b00726d3a7fec52931d23917fca57ece3380e39f4e565ebd956e6475e5f68c1a692ad5f0d289cccf3294551d7e4cb668109e1b043150819b965bac11d6c5e56ad2817ed2f2994f856a3163b248aea293134f045240f38befb7241e7566671ca80eb007ca2f0767e95484c38e73f6931976c9d105aa08f5c6fa3d21cc0f8391b559aac554e394549edbda0bd78d95a2fdad3a21cbc600ca9a244759d7952e762bf7afead7665325fcf957bc05262224460bd415ac282f74ef523eb5d6032ba3e04bad44f83509bc67961981bebc3c07c6a0228220cf5c2a7615ad36a8969c9260070d6c9d4956ed1b52084cd5d7f66a626d185ca042928f2ddd90ad97c857212fe8fec36f097903214c2aa4b3f66f1d2399ccda76a7f60df80207a7d2cecadaad1e38f4f66e45df6170f3fe209395c3562290613ddc39d0a4dcb70c21fede210ca1ede6b4a0c27d239c16a9e9682e6a34b37af1a8df7b494534d10ea1174c47a4909e3fb4cb019545621717010b42ff7b36b1b02e641c92df5f21d1aa1496c06041c632e2d949cbadcf4bc4aea549893146c9e394510c970cffb9fb22590cf9eea4915ce71a0a968963bffb7007dcf2d3debae8f7131abfdf8e447adac768daf8510b1c77f4b87824d51f1460d255e53ab833d66f489a3e202a83cb5bf8f3514bcf71c7e0dd79797e4b15fe78d19139567e1eae407fbe8534b56aed13a8c5e77c659907eb0915f0a4e3fad0ad75bbab017a419e4b162ea3b952912a22c2c9717d3208c4f5b4433252267364daaa514e9d318290de2623ada2ceb4685a68e5e8fe9d8b3ddea1f302f07cfe4341e6c3ec29ba4426ce6967f27affcf5ca0faa7c61a3bda4e99a794a47b177df8fb46860a8b25742d8e1b29bf2aa3c69cfcf7876d58961ca292b830ebd573b43f5ff6dafee0fe5cda74435ae551f97b5d9b649aa45bb2c59cd63da082014e537c33d0fb901d2da8e39deaa5fa4dad823551d714750183d675080e7b04146451c2eed15a7241c22210c680ea7f725206db13f4641b4ee57d98ba03ad291a0a366b48e1abe0fe75f14d8df19813adc5a4fd839757cd20f668e6149395ab7e9c71700335cd1be3507b35201a8e0542d399d0e3c919abf6bebf39c344d29649c2d44fe66eda90219fb4298441deb9580f5d2c0b673cc145aaae2fda35033effab0b9a4050d3584606fa2b80612120e0811a860b9917e3d5287da320476c894ea5a473531007db6fe71650e69fa59cb672bf40b7c6113328b42a6a9bc3ea8b301ea1f72082baed8ff9074a8ecc88d5b88c8fd63e3e27d790dee5117b36b07e7178a354c5c9decf57d6b46e6c5176e5c6e24cf49380289020ab6d6dbe9f7feb5c64b48330a4d69fbbb333f4e924915a5336460bd775a1bab417f514ea004c984ebe16a5806d8d956208c911f9b6aaba28c40568b445eb8a859fc2e857988821776db114f5608a2b9bdbef50093f537539b3174c377c00c56cfe6cf339e882a2ea61e80ab339be54543a851e726d72f2b0cd8e2048d9b0166f9367a506fdcb4d047dfdc5fd9c90934f5458ee9f98ba47f46a982f3306485fcddf1ed5249661c604db61c7fbb734295e16c6b8b95eeb25dbdfdfc7461c91750d78ac0c0539d207b339e799fb0904be74bb450890bf719d49e4870c60166ba98b0b26d5fc81df7942a6cfc1bcf21a5191e4f5b37ad3293b7e40d5544f6d9fe90b32255e060105f20d44db484b299aa3c5a4d8eb78d85e9a9f12f1b17ac8023f35c865c6bd2a0066ce07759602a27492b900f2695844f5ae81ba1bb21a2b01e9582795af4f9a48bbf88c404939bfe608b83e8350d30d82d5def99312fc19d58bbf6240e76e743377e98b85f62d91ee52879f0f23741457f504e14d0bff1754fd39d1d33f121f969d0cf738d711e4cabe8c60d0f5a6af016912a96b816d4559b189a84a6d82254438e465daab64f0123ba049144effb2aba499aebc459115633ad80d508a0d9be524e8b02fb62620bcb314c1a2304dd3f32a071055e2f137ca4a5922db2f3d93fe6148557ec75d436eb1b07536b7471da2b00a6d3cdb5ac4e5ff7a0f8825fae76c77e112c428745748ffd011830bedbb9dcc74bc85830e5c5cb357e01f64bf63638eb9410a223435a582283d02f49335ffc8f34ddda3c42a8a0561ae226da018c37717351ed18be8ea69b01c960200c6800f9e4580d3c9525016b4159c31f042f8df4a938cc3b7c2b9814ee3673a1c0fce86ae2f976d7bdf5ca27a8ca3f923b0aca6b32b86cd797cbcb6f602e3ccf5ccc9bf51025ffd2d0d7f404e5f49389e2ed088c6d3be60e1e770e58d6908439ce5aa7dfbfbb2121775b57f2a0d3c4e278255860681a96f8f4f69c7656d2bc2f7809ea5f276d0789fe6471c468c76a93e0920f7a7f4e6537f91cb09aea2117ab7f7ebe2dbd074a1cd95933c80df5a5b5da8e3b79b7c3538829eee341640c84184e60d3847b0ea1a4505dc56688c1d9845cfb350f65c56709c131ad17eace8b02420f0bd63404d6a38afdf209d5f130f7672bf427fc31f8aa5ee7c1bfa67519d40c95441c7fc995e4f1bd1f5abd56aac0306b88d54699dcc0d53f625cb9d01151a5eed97f24c54f78bba01ef59a4ba14541c769c8e23b59a0fe06215b36cf60c4e296f3e50cedd90e88b5614ee8bb233673e78c23ba14b89ad0306278ec1b02c461104bf8269e6ba7ac7732057de5066c7d05d840971f1efb3f5c83d0e3920a0528f776a67539da886d43ca39938ac4de28e1d9b9d2b5df25d5a94c37d27821d484f7243a103764398d94344a1f90f939ffc30c058a67bd991efc14375951e5a0df95d8d5647c1c64df5d9c64166dad5dd7a0af5f87777003af1b8f1180abc6b7c48e9ba715c3f47a8566d63f449cc264412924902e207aaada7519fa5c4066a2d2922c9bfac9e7a5f8bddf62b728d4c84bd4145648c150db5881ba2072ee15867a0d33d49d9fcac285a175e05daf1c0788deda6d90c6e893d314c2a2c6ca95d5a53e569da6bc789b499f5d3b3d5da9625019086736f906979d2e51631749db309e74e0707cc8514ec0d19ca4d1b03a06f3ef04f530f2dae8d2448b203cf186c669666fbb390df6dbf009842b9b22254610f263a85fe110715439b22b68d05a20abc3d7eadfd187affcc9ae322c660104c18c849176f64683b09bed0bdba3cac794a6a2cbc1ac8834f476efb50a1d345dc637f641f0fb74105b7bd4f337d39c2567c200d7cd8e006f6820dff7d9eb3ea74ad3091bf57afbed973600c1605b4841e20057e198783d54040d3e26f002f541300d0be35e4e521093dcfe436f3c4122291f598f64ea65a0381de842e24b737181b01c989905a88bf333b860afe8b15f1793b50e72676a7390c61d9793f6c2fc00996553ce9e67d6820b5e03b05632b6f894368730ccddf854bd880ebac2090c9c2749270a5888268e222d5574e302e0f5cc6f28ba806b9588f03a266cdd36c88dd22f51f792aef5e21164bbfafbe608dc04d86f9638f09827b6879be68c06cd0738e791fe986c58e05f429b4d2e2a63140d84aa30e19ef2fae2a16bf1e11048cd6de639eadfa7c8917747d24815235d553cde6b7aca84e25426b5687dfbb2c406407bd28cacb4d519b458b270fabfc29e6e0e19535ab48882cc811f525a954705ee06e24955115b5119459878d5a3d5d609e36f5f7ab3326e304014b01c9a18c3d87ee007d5ee14bbc72f69eda90237001d57325c8e802ef1ca72fdfd714df3883b23e32eed1245e9aac07ad8fa98948f2c34601cb5445f93616e162c851f7d8a0cea7f4880a7367a0fdefbfdcf488419cffbe7c7d41a0ec704038b0590eb8abecf3affefa3133eaa4a9300f002b2dc07e46fd50e6f2ef8953f4ca218a35e3722e46c0e699cd08ec778199ee4c2bca542e8a963594fe62d2a7c03134c87351d531902b49d0ac970378603dd5c78a779ae3c282047e1bb98d216a3e2f46e5b3450b8e53d4d8a3cd81b07511e38d71b5e88de2a5ba4145cb19fc8e6841871ff814e2200840f99dd652470d75cc31d222aeda7bac78ed18a05d240ce4fb6ad326a0ccc4ad36bd48b0ead422377e84c4101dac3b04b6e074456359bbf08542b504c0b09394cac587c1765f18bd35945b330f3df1dbb5b6c41165228d1b17ccd3bc9a29a1093ae6fc6d83b92a5dd526da8489de39c4f69ae21e0536251c0477040ca35366895ec705f0e418064b374b6ef021d73dead665916a404c8e227f6b2ffb3766c373e747645b003f442fdf84b5956cb586b9cdb4794254b5087d361eece59cc8c10b3bce276745058d278f74e672aeac242bc34089f526171ac70ba9341354bdd8e1fb3f5d69da936d19ededb76383928287b753d23638fa2a238aa3fa523966f6f29f3116c3c10e16334b342d4148ed3cd3065ae8cd848c5dbc93ed365ef97d4e1a4a7359a1c7d19121764da0b87a7ea37c49defb6df3563aaa1739a11484256963cf823dd5d0b8e4e2f0314eeeebb19228da761e1ffe3e711de2def8cb91ff9c166116dc7923098c0498620a212d2850a6f0d61a134087ca755faed866b211bc3a32458c3dda783cc3e6a4aa741e78c68c5246d9e50d8b47d6224c1aa783e40560d9a799e004ec542ba218e478edfabcd54f4b8d5d912720a6f8218c9e462b6d7b41d837d0e34294b85a3a973e728c873d787d6f03d7853e3d709e2d826fa25c2315f47474a9cf4719d736d6f4819bbb29d8ee1ed6bdcf6d8ea413c12981ca537911746cceadca94187fa67e4e80b3fd3c979d93e96b914f5b0bbe860282d90876a3a2f1ec35e4ca33841e54d132cbff5288562ce6c3321fb0785c00f5b408c28854fdac8d1e78781e3798ff899266cb13b5154d47d25f21266a002963d11bb9d322784c6056fbb43d5fb4f197a60d9c150389c7399d2ffe777f7b88aafde1c59754399704f772cf48fa23bee612fd16732ab69aef878678b206aba97b34a21d9151ea08404426487d7a7d8f29e585cfcb279db90f1281f76bf875d58e928ef3e7cc4bb90116bb7505ddd2a6166c7fe0541623e63d17185ea93f5e473a81d915e6047e6e531bddd06588ef9e5f599d8d2298b76ec4c127e1b67507220e5b551fa2613d391f15f1ff3d1359b93def1884212d9ac6b183a647da275c9c0b0741cf38fabef4e8eee8b8cecfe23134bea704dbc72da8180350bbc5ecb821b98f1bbdea81d5cff77a304bfdae3fcf8488468079dc2723e587489bf2c221fb28e089696a44cbd91e45f8926c6a975162510deeb03e0b35c0ecb4b8481a8613eb04f417d6886d3b9f0b3e5164c510240319a16e1f765fa79a6b222cd6729b38430b7c60e5f5588c6ba86c7968f3559a952cc6dae8076ff9f68eb5442b5c6349111971ac20e1f416ec089e969fddf2a6f2a6f335f4cdd65f0998e130d4a4a639682828ba22a99251b0b543dc455dd9d255b35865782cde637bde63b3f2b1938722336f0e66ca229773a1154383df69701009082a5eedfe9ada4646a8e76eaff80f594c93d5f9556bba04286e9204ce8b0e978e8f37a669b2dc7e2d26295ced74a0e70ada1ac04ba241e75a6a830cb3bcb3454a3586d890bc8db6e7cef0117f59515edbbfa1fe48f5d1a01b510ba930607becedc5f0f7e8b544af8553ae2af0a9d44b598492632ff77bb5b6e83c667f6746a70446a03ca543fec11aeed9c0c605e80bdc29b31d12ecc602d340546f6224cab9d69015fb42906ecac992d37", 0x1000}, {&(0x7f0000002180)="ba0e69a0d5053c050f232f293e04dfaef2ea596afbab92db41bf706061b669da4e47c8a9a3e54eb567c582a2af8639c4c554eabd4d93481e9472e05e2f0f7550707c0e9b752252ea7a216d12e7040bd6ca7f33a25f48321a9f5a8813c09a4f812af0cffe69aa70fb195bb4c76ba04b6647f49a0a9f9ef9272d262d19df04bf91ce7bd6493a614bcdeba4e92af08fb4cde3e742d62d23", 0x96}, {&(0x7f0000000080)="9c900ef9a2ec2080864fca6c411bfc27fb624e249daad4869e30ced3cb50a7977f7e58868354b67cdac16b0bffcc1942d685413906c2", 0x36}, {&(0x7f0000002240)="0355bc00b480acc618cd4f48838e65254fed875fc9cce2f0d089d19805a8e2e8c4605ea30f8641e9ed602766a9b05441330e4e1d450e6576d360d7ada9f0a799f96c8188624bd05aa7b1d29f4390fe3468c1f1ce64838e27d6bdb163f69b746529bf0f9e5ef5688992eacc620a6a7c8b634a13d65a02a55c096f9489b8c81cdd2a8f1174c2bad5ce6423d91b961d6ee54242c2a0b6f3a489c486f2eb097af05d4f1bdccf9a09892c68ff12cf37cee8d296c5a4c5ba", 0xb5}, {&(0x7f0000002300)="ea82f77c291bc655d25917219809b326e415442901d704d3cdaf79569a2b188bd5ce0590a3ecb1022b3eaa56eebf619289d838241da06950db8f642a87f0e91e689ea46f343d2f65cd3bd2a72c94fc15391b101050d1c53656af597625d2f5536f48998a14b7e3097ebc", 0x6a}], 0x6, &(0x7f0000002400)=[{0x100, 0x88ca8ad209b55671, 0x291, "002a87f6faa8f32d6d677f31a1438cd9719007bab1b50fe14beda640e21f9f80ff1da63fde6d19c814ae01439e6c8c450d51953d1472c912c1765836015a913d6abf239c8fd9e1eeaeb607e58dc3fe3ddc47af3f8a4002602072d6867e00944e7ad2dd04f7a228b8ca8907c7503eed557bf7b315e9253c5cc557c2b906f3012b8502ce0ccf18854c94fc22d390e358ece34f775cc91a916dcd9a97d4f0487c690b122b2139cc1a50ffcc5738762df8ac713a85a19f96685412cddd810195e81a52071b155af579848a6494035a7a2e5d52b416163847a3640003b806af089d1e741739e63f2aaac4de33b8080c"}, {0xc0, 0x111, 0x2400, "943d32d4ebfd91904fa19cad046f4a9bb5b8c76bb6af949598a9064f812c48e4ea42409dac4259f3b4678cfceabcd237d4a2a9959e205300ace4be0c2db69c577ad4503026cc5611f04166c6e60bcfbba45f1d965ffea0c3aba910fdb6408a9f03f73bf3dbe0434b42bd829f61edab51c70cd0f3ff88f79a4a2d85b6ca426b49c9bd6f88410c52d80a1e89d29b8932f739bdeb7815915f20ee8b61f79b7a90b61088851da3b9b2ef89ab80"}, {0x50, 0x111, 0xee, "24e1e18f4412e7b16d6db19a7a38cdaf9f15c34a27918172ce022b2d9cdd658224dc3484146dc5b05273372bc8fe3fe862ce1f019830c4cc7fc7588b5fc6"}, {0xc0, 0x0, 0x2, "9ce20785b886da6e7594e7455466f88e725d9769707e42ec51f1e22a75e6298cea04059356d0e136857eb612a4f3f060851450107c6f536eedefc9a0a70dfb0ca3fd0af959ef144526f6ff5307a5b7ca543a83520ca6b9f4fb4c50213866ad39e952414301db4dffcb4ba2a3b9f1e4adf21e34987e80b452d452fc6f38ae433899f708eff093808814408a0bf2cf92561a4a0c5bdc15871aa36e4733fc9cae4ba95070be460a53fc1f438a"}, {0x58, 0x100, 0x6, "1be096f99ec835c0cebec3bc0c70f6c2f950371101e6d9326ccbb23a743402d8678d49a7532bad6f63ee47ca90bb32209d09eb84f3e8039c9ab959ad7446c70f21eb2337d92be81b"}, {0x40, 0x109, 0x1, "3548524977e915d35278f41a7db3b1324ca8fb3586dbbcbb0a5c4fde98ff589994f46c063c20ee6ab4f07f085f0e842d"}, {0x78, 0x107, 0x7, "3e1bff19198dc88627d509ca51d2d9405c06177d2d3991a1957c60bbf12b625f916d583e0a3849439ce9fd26a7b148efa219adfab170e2977451f125e539c998355fd145c1daa7073bdff959f5817a0c3ca19d8d10e68135f9ff9638a96be9d0ee9b3c81"}], 0x3e0}, 0xd0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:52 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:52 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) [ 510.119191][T20258] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 510.178082][T20258] CPU: 1 PID: 20258 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 510.186042][T20258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.196108][T20258] Call Trace: [ 510.199404][T20258] dump_stack+0x172/0x1f0 [ 510.203737][T20258] sysfs_warn_dup.cold+0x1c/0x31 [ 510.208673][T20258] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 510.214730][T20258] sysfs_create_link+0x65/0xc0 [ 510.219480][T20258] device_add+0x75c/0x17a0 [ 510.223880][T20258] ? mark_lock+0xc2/0x1220 [ 510.228295][T20258] ? uevent_show+0x370/0x370 [ 510.232869][T20258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 510.239101][T20258] wiphy_register+0x1c46/0x2720 [ 510.243946][T20258] ? wiphy_unregister+0x1040/0x1040 [ 510.249128][T20258] ? __kmalloc+0x608/0x770 [ 510.253528][T20258] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 510.259314][T20258] ? lockdep_hardirqs_on+0x421/0x5e0 [ 510.264580][T20258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 510.270799][T20258] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 510.276417][T20258] ieee80211_register_hw+0x157e/0x3ac0 [ 510.281865][T20258] ? ieee80211_ifa_changed+0xde0/0xde0 [ 510.287307][T20258] ? memset+0x32/0x40 [ 510.291272][T20258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 510.297495][T20258] ? __hrtimer_init+0x13d/0x280 [ 510.302350][T20258] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 510.308061][T20258] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 510.314554][T20258] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 510.320431][T20258] hwsim_new_radio_nl+0x9e3/0x1070 [ 510.325528][T20258] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 510.331418][T20258] ? nla_memcpy+0xb0/0xb0 [ 510.335738][T20258] ? __nla_parse+0x43/0x60 [ 510.340144][T20258] genl_family_rcv_msg+0x74b/0xf90 [ 510.345242][T20258] ? genl_unregister_family+0x7b0/0x7b0 [ 510.350771][T20258] ? __kasan_check_read+0x11/0x20 [ 510.355777][T20258] ? __lock_acquire+0x16f2/0x4a00 [ 510.360792][T20258] ? __dev_queue_xmit+0xbb5/0x3720 [ 510.365904][T20258] genl_rcv_msg+0xca/0x170 [ 510.370309][T20258] netlink_rcv_skb+0x177/0x450 [ 510.375056][T20258] ? genl_family_rcv_msg+0xf90/0xf90 [ 510.380326][T20258] ? netlink_ack+0xb50/0xb50 [ 510.384932][T20258] ? __kasan_check_write+0x14/0x20 [ 510.390032][T20258] ? netlink_deliver_tap+0x254/0xbf0 [ 510.395320][T20258] genl_rcv+0x29/0x40 [ 510.399286][T20258] netlink_unicast+0x531/0x710 [ 510.404041][T20258] ? netlink_attachskb+0x7c0/0x7c0 [ 510.409135][T20258] ? _copy_from_iter_full+0x25d/0x8c0 [ 510.414495][T20258] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 510.420195][T20258] ? __check_object_size+0x3d/0x437 [ 510.425388][T20258] netlink_sendmsg+0x8a5/0xd60 [ 510.430138][T20258] ? netlink_unicast+0x710/0x710 [ 510.435056][T20258] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 510.440585][T20258] ? apparmor_socket_sendmsg+0x2a/0x30 [ 510.446029][T20258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 510.452256][T20258] ? security_socket_sendmsg+0x8d/0xc0 [ 510.457693][T20258] ? netlink_unicast+0x710/0x710 [ 510.462612][T20258] sock_sendmsg+0xd7/0x130 [ 510.467012][T20258] ___sys_sendmsg+0x803/0x920 [ 510.471672][T20258] ? copy_msghdr_from_user+0x440/0x440 [ 510.477128][T20258] ? __kasan_check_read+0x11/0x20 [ 510.482141][T20258] ? __fget+0x384/0x560 [ 510.486284][T20258] ? ksys_dup3+0x3e0/0x3e0 [ 510.490697][T20258] ? __fget_light+0x1a9/0x230 [ 510.495358][T20258] ? __fdget+0x1b/0x20 [ 510.499409][T20258] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 510.505913][T20258] __sys_sendmsg+0x105/0x1d0 [ 510.510487][T20258] ? __sys_sendmsg_sock+0xd0/0xd0 [ 510.515504][T20258] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 510.520956][T20258] ? do_syscall_64+0x26/0x760 [ 510.525625][T20258] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 510.531680][T20258] ? do_syscall_64+0x26/0x760 [ 510.536343][T20258] __x64_sys_sendmsg+0x78/0xb0 [ 510.541099][T20258] do_syscall_64+0xfa/0x760 [ 510.545591][T20258] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 510.551462][T20258] RIP: 0033:0x459a59 [ 510.555343][T20258] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:55:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04041800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 510.574928][T20258] RSP: 002b:00007f4bf17e3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 510.583321][T20258] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 510.591277][T20258] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 510.599231][T20258] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 510.607186][T20258] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf17e46d4 [ 510.615140][T20258] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:53 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf040088eb04001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 510.741279][T20276] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 19:55:53 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:53 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) [ 510.904778][T20284] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 510.951566][T20284] CPU: 0 PID: 20284 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 510.959497][T20284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.969563][T20284] Call Trace: [ 510.972868][T20284] dump_stack+0x172/0x1f0 [ 510.977217][T20284] sysfs_warn_dup.cold+0x1c/0x31 [ 510.982194][T20284] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 510.988287][T20284] sysfs_create_link+0x65/0xc0 [ 510.993078][T20284] device_add+0x75c/0x17a0 [ 510.997524][T20284] ? uevent_show+0x370/0x370 [ 511.002134][T20284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 511.008406][T20284] wiphy_register+0x1c46/0x2720 [ 511.013276][T20284] ? wiphy_unregister+0x1040/0x1040 [ 511.018488][T20284] ? __kmalloc+0x608/0x770 [ 511.022921][T20284] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 511.028751][T20284] ? lockdep_hardirqs_on+0x421/0x5e0 [ 511.034057][T20284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 511.040321][T20284] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 511.045975][T20284] ieee80211_register_hw+0x157e/0x3ac0 [ 511.051458][T20284] ? ieee80211_ifa_changed+0xde0/0xde0 [ 511.056936][T20284] ? memset+0x32/0x40 [ 511.060939][T20284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 511.067193][T20284] ? __hrtimer_init+0x13d/0x280 [ 511.072098][T20284] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 511.077855][T20284] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 511.084291][T20284] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 511.090205][T20284] hwsim_new_radio_nl+0x9e3/0x1070 [ 511.095349][T20284] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 511.101278][T20284] ? nla_memcpy+0xb0/0xb0 [ 511.105634][T20284] ? __nla_parse+0x43/0x60 [ 511.110071][T20284] genl_family_rcv_msg+0x74b/0xf90 [ 511.115203][T20284] ? genl_unregister_family+0x7b0/0x7b0 [ 511.120759][T20284] ? __kasan_check_read+0x11/0x20 [ 511.125812][T20284] ? __lock_acquire+0x16f2/0x4a00 [ 511.130853][T20284] ? __dev_queue_xmit+0xbb5/0x3720 [ 511.135995][T20284] genl_rcv_msg+0xca/0x170 [ 511.140429][T20284] netlink_rcv_skb+0x177/0x450 [ 511.145213][T20284] ? genl_family_rcv_msg+0xf90/0xf90 [ 511.150517][T20284] ? netlink_ack+0xb50/0xb50 [ 511.155119][T20284] ? __kasan_check_write+0x14/0x20 [ 511.160251][T20284] ? netlink_deliver_tap+0x254/0xbf0 [ 511.165557][T20284] genl_rcv+0x29/0x40 [ 511.169554][T20284] netlink_unicast+0x531/0x710 [ 511.174341][T20284] ? netlink_attachskb+0x7c0/0x7c0 [ 511.179494][T20284] ? _copy_from_iter_full+0x25d/0x8c0 [ 511.184885][T20284] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 511.190616][T20284] ? __check_object_size+0x3d/0x437 [ 511.195830][T20284] netlink_sendmsg+0x8a5/0xd60 [ 511.200633][T20284] ? netlink_unicast+0x710/0x710 [ 511.205584][T20284] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 511.211142][T20284] ? apparmor_socket_sendmsg+0x2a/0x30 [ 511.216613][T20284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 511.222862][T20284] ? security_socket_sendmsg+0x8d/0xc0 [ 511.228339][T20284] ? netlink_unicast+0x710/0x710 [ 511.233289][T20284] sock_sendmsg+0xd7/0x130 [ 511.237719][T20284] ___sys_sendmsg+0x803/0x920 [ 511.242414][T20284] ? copy_msghdr_from_user+0x440/0x440 [ 511.247896][T20284] ? __kasan_check_read+0x11/0x20 [ 511.252938][T20284] ? __fget+0x384/0x560 [ 511.257118][T20284] ? ksys_dup3+0x3e0/0x3e0 [ 511.261556][T20284] ? __fget_light+0x1a9/0x230 [ 511.266245][T20284] ? __fdget+0x1b/0x20 [ 511.270326][T20284] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 511.276581][T20284] __sys_sendmsg+0x105/0x1d0 [ 511.281190][T20284] ? __sys_sendmsg_sock+0xd0/0xd0 [ 511.286243][T20284] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 511.291717][T20284] ? do_syscall_64+0x26/0x760 [ 511.296407][T20284] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 511.302500][T20284] ? do_syscall_64+0x26/0x760 [ 511.307209][T20284] __x64_sys_sendmsg+0x78/0xb0 [ 511.312004][T20284] do_syscall_64+0xfa/0x760 [ 511.316530][T20284] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 511.322436][T20284] RIP: 0033:0x459a59 [ 511.326350][T20284] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:55:53 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 511.345971][T20284] RSP: 002b:00007f4bf17e3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 511.354390][T20284] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 511.362368][T20284] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 511.370365][T20284] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 511.378349][T20284] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf17e46d4 [ 511.386327][T20284] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:55:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04051800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:53 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:53 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:54 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 511.831072][T20303] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 19:55:54 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:54 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb02001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open$cgroup(&(0x7f0000000040)={0xc, 0x70, 0x4, 0x2c, 0x21, 0xf8, 0x0, 0x9, 0x4, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x4, @perf_config_ext={0x1000}, 0x200, 0xffffffffffff15c9, 0xffff, 0xfc3d174b1d0a12a3, 0x400, 0x2ca8, 0x4}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x12) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r2, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x881, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x0, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r8, 0xbb, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r9}, 0xc) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)={r9}, 0xc) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r7, r10, 0x14, 0x1}, 0x10) [ 511.957850][T20301] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 19:55:54 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 512.119068][T20326] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 19:55:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04061800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:54 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb03001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 512.295414][T20338] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 512.462845][T20345] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 19:55:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04071800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:54 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:55 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb05001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 512.659154][T20351] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 19:55:55 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:55 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x9ac28872d299cb1e}, 0x10) write$cgroup_pid(r2, &(0x7f00000000c0), 0x12) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r4, 0x0, 0x5}, 0x3c) openat$cgroup_type(r4, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r4, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r5, &(0x7f00000000c0), 0x12) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r6, 0x0, 0x5}, 0x3c) openat$cgroup_type(r6, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext={0x0, 0x3}, 0x8, 0x100000000000, 0x8, 0x4, 0xfa, 0x7}, 0x0, 0x0, r6, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x40, 0x4, 0x20, 0x0, 0x297, 0x21008, 0xaa2321e168cada93, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000280), 0xc}, 0x80, 0x1000, 0xa5, 0x339f978523d4bdf4, 0x2, 0x2d2f, 0x85f4}, 0x0, 0xf, r8, 0x2) perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x70, 0x4, 0x1, 0x1f, 0x5, 0x0, 0x8, 0x20120, 0x9, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x3, @perf_bp={&(0x7f0000000240), 0x4}, 0x400, 0x100000001, 0x8, 0x2, 0x4, 0x7fff, 0xfff8}, r6, 0x2, r9, 0x4) r10 = openat$cgroup_procs(r4, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) r11 = getpid() write$cgroup_pid(r10, &(0x7f0000000180)=r11, 0x12) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) r12 = socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0x3e, &(0x7f0000000040)=r2, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r13, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:55 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) [ 512.797601][T20356] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.5'. 19:55:55 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04081800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:55 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb06001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:55 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) [ 513.008951][T20372] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 513.151906][T20377] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.5'. 19:55:55 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb07001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:55 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04091800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 513.330185][T20392] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.5'. 19:55:55 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:55 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:55 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb08001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:55 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:55 executing program 1: 19:55:55 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb040a1800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:56 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb0c001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:56 executing program 1: 19:55:56 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:56 executing program 1: 19:55:56 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb0e001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:56 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb040b1800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:56 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:56 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0), 0x9ade7f374f463ea6}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f00000008c0)}, 0x20) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x20000004) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x401, 0x8, 0x0, 0x0, 0x0, 0x20001, 0x8, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1f, 0xffff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xf, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 19:55:56 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb10001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:56 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb040e1800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0), 0x9ade7f374f463ea6}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f00000008c0)}, 0x20) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x20000004) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x401, 0x8, 0x0, 0x0, 0x0, 0x20001, 0x8, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1f, 0xffff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xf, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 19:55:56 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb12001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:57 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04481800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:57 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r3, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:57 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb19001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0), 0x9ade7f374f463ea6}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f00000008c0)}, 0x20) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x20000004) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x401, 0x8, 0x0, 0x0, 0x0, 0x20001, 0x8, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1f, 0xffff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xf, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 19:55:57 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)) 19:55:57 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:57 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb1a001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:57 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb044c1800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:57 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 19:55:57 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:57 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04601800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:57 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb58001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:57 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:57 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r3, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:57 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:58 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb5a001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:58 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04681800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:58 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r3, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:58 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r3, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:58 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb71001800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:58 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb046c1800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:58 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:58 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:58 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb00581800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:59 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04741800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:59 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb005a1800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:59 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb047a1800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 516.942479][T20589] __nla_validate_parse: 19 callbacks suppressed [ 516.942488][T20589] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 19:55:59 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:59 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r3, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:59 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:55:59 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r3, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) [ 517.173105][T20592] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 19:55:59 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb00711800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:55:59 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04001900160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 517.398960][T20618] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 19:55:59 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:55:59 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) [ 517.636580][T20625] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 517.671974][T20625] CPU: 0 PID: 20625 Comm: syz-executor.2 Not tainted 5.4.0-rc1+ #0 [ 517.680002][T20625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.690070][T20625] Call Trace: [ 517.693393][T20625] dump_stack+0x172/0x1f0 [ 517.697754][T20625] sysfs_warn_dup.cold+0x1c/0x31 [ 517.702724][T20625] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 517.708823][T20625] sysfs_create_link+0x65/0xc0 [ 517.713605][T20625] device_add+0x75c/0x17a0 [ 517.718057][T20625] ? mark_lock+0xc2/0x1220 [ 517.722487][T20625] ? uevent_show+0x370/0x370 [ 517.727084][T20625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 517.733340][T20625] wiphy_register+0x1c46/0x2720 [ 517.738217][T20625] ? wiphy_unregister+0x1040/0x1040 [ 517.743450][T20625] ? __kmalloc+0x608/0x770 [ 517.747886][T20625] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 517.753704][T20625] ? lockdep_hardirqs_on+0x421/0x5e0 [ 517.759002][T20625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 517.765258][T20625] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 517.770917][T20625] ieee80211_register_hw+0x157e/0x3ac0 [ 517.776408][T20625] ? ieee80211_ifa_changed+0xde0/0xde0 [ 517.781887][T20625] ? memset+0x32/0x40 [ 517.785886][T20625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 517.792138][T20625] ? __hrtimer_init+0x13d/0x280 [ 517.797023][T20625] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 517.802781][T20625] ? __kasan_check_read+0x11/0x20 [ 517.807838][T20625] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 517.814272][T20625] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 517.820184][T20625] hwsim_new_radio_nl+0x9e3/0x1070 [ 517.825311][T20625] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 517.831209][T20625] ? nla_memcpy+0xb0/0xb0 [ 517.835560][T20625] ? __nla_parse+0x43/0x60 [ 517.840084][T20625] genl_family_rcv_msg+0x74b/0xf90 [ 517.845216][T20625] ? genl_unregister_family+0x7b0/0x7b0 [ 517.850773][T20625] ? __kasan_check_read+0x11/0x20 [ 517.855805][T20625] ? __lock_acquire+0x16f2/0x4a00 [ 517.860843][T20625] ? __dev_queue_xmit+0xbb5/0x3720 [ 517.865978][T20625] genl_rcv_msg+0xca/0x170 [ 517.870402][T20625] netlink_rcv_skb+0x177/0x450 [ 517.875182][T20625] ? genl_family_rcv_msg+0xf90/0xf90 [ 517.880473][T20625] ? netlink_ack+0xb50/0xb50 [ 517.885938][T20625] ? __kasan_check_write+0x14/0x20 [ 517.891075][T20625] ? netlink_deliver_tap+0x254/0xbf0 [ 517.896380][T20625] genl_rcv+0x29/0x40 [ 517.900466][T20625] netlink_unicast+0x531/0x710 [ 517.905246][T20625] ? netlink_attachskb+0x7c0/0x7c0 [ 517.910380][T20625] ? _copy_from_iter_full+0x25d/0x8c0 [ 517.915769][T20625] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 517.921497][T20625] ? __check_object_size+0x3d/0x437 [ 517.926795][T20625] netlink_sendmsg+0x8a5/0xd60 [ 517.931568][T20625] ? netlink_unicast+0x710/0x710 [ 517.936513][T20625] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 517.942065][T20625] ? apparmor_socket_sendmsg+0x2a/0x30 [ 517.947536][T20625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 517.953783][T20625] ? security_socket_sendmsg+0x8d/0xc0 [ 517.959274][T20625] ? netlink_unicast+0x710/0x710 [ 517.964240][T20625] sock_sendmsg+0xd7/0x130 [ 517.968683][T20625] ___sys_sendmsg+0x803/0x920 [ 517.973377][T20625] ? copy_msghdr_from_user+0x440/0x440 [ 517.978857][T20625] ? __kasan_check_read+0x11/0x20 [ 517.983911][T20625] ? __fget+0x384/0x560 [ 517.988089][T20625] ? ksys_dup3+0x3e0/0x3e0 [ 517.992518][T20625] ? __fget_light+0x1a9/0x230 [ 517.997196][T20625] ? __fdget+0x1b/0x20 [ 518.001363][T20625] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 518.007622][T20625] __sys_sendmsg+0x105/0x1d0 [ 518.012225][T20625] ? __sys_sendmsg_sock+0xd0/0xd0 [ 518.017283][T20625] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 518.022752][T20625] ? do_syscall_64+0x26/0x760 [ 518.028327][T20625] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 518.034401][T20625] ? do_syscall_64+0x26/0x760 [ 518.039092][T20625] __x64_sys_sendmsg+0x78/0xb0 [ 518.043873][T20625] do_syscall_64+0xfa/0x760 [ 518.048388][T20625] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 518.054292][T20625] RIP: 0033:0x459a59 [ 518.058198][T20625] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 518.077819][T20625] RSP: 002b:00007f108cb2bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 19:56:00 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r4, 0x0, 0x5}, 0x3c) openat$cgroup_type(r4, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r5 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r6 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 518.086246][T20625] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 518.095727][T20625] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 518.103708][T20625] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 518.111688][T20625] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f108cb2c6d4 [ 518.119675][T20625] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:56:00 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r3, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:56:00 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04001100160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:56:00 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r3, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:56:00 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04002f00160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:56:00 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04021800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 518.558681][T20655] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 518.604888][T20655] CPU: 1 PID: 20655 Comm: syz-executor.2 Not tainted 5.4.0-rc1+ #0 [ 518.612825][T20655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.622887][T20655] Call Trace: [ 518.626456][T20655] dump_stack+0x172/0x1f0 [ 518.630819][T20655] sysfs_warn_dup.cold+0x1c/0x31 [ 518.635780][T20655] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 518.641863][T20655] sysfs_create_link+0x65/0xc0 [ 518.646642][T20655] device_add+0x75c/0x17a0 19:56:01 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r4, 0x0, 0x5}, 0x3c) openat$cgroup_type(r4, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r5 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r6 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 518.651067][T20655] ? mark_lock+0xc2/0x1220 [ 518.655502][T20655] ? uevent_show+0x370/0x370 [ 518.660106][T20655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 518.666370][T20655] wiphy_register+0x1c46/0x2720 [ 518.671246][T20655] ? wiphy_unregister+0x1040/0x1040 [ 518.676460][T20655] ? __kmalloc+0x608/0x770 [ 518.680884][T20655] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 518.686701][T20655] ? lockdep_hardirqs_on+0x421/0x5e0 [ 518.692037][T20655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 518.698387][T20655] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 518.704043][T20655] ieee80211_register_hw+0x157e/0x3ac0 [ 518.709518][T20655] ? ieee80211_ifa_changed+0xde0/0xde0 [ 518.715002][T20655] ? memset+0x32/0x40 [ 518.719002][T20655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 518.725262][T20655] ? __hrtimer_init+0x13d/0x280 [ 518.730123][T20655] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 518.735868][T20655] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 518.742304][T20655] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 518.748219][T20655] hwsim_new_radio_nl+0x9e3/0x1070 [ 518.753380][T20655] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 518.759293][T20655] ? nla_memcpy+0xb0/0xb0 [ 518.763656][T20655] ? __nla_parse+0x43/0x60 [ 518.768098][T20655] genl_family_rcv_msg+0x74b/0xf90 [ 518.773240][T20655] ? genl_unregister_family+0x7b0/0x7b0 [ 518.778819][T20655] ? __kasan_check_read+0x11/0x20 [ 518.783852][T20655] ? __lock_acquire+0x16f2/0x4a00 [ 518.788884][T20655] ? __dev_queue_xmit+0xbb5/0x3720 [ 518.794161][T20655] genl_rcv_msg+0xca/0x170 [ 518.798614][T20655] netlink_rcv_skb+0x177/0x450 [ 518.803384][T20655] ? genl_family_rcv_msg+0xf90/0xf90 [ 518.808682][T20655] ? netlink_ack+0xb50/0xb50 [ 518.813294][T20655] ? __kasan_check_write+0x14/0x20 [ 518.818425][T20655] ? netlink_deliver_tap+0x254/0xbf0 [ 518.823734][T20655] genl_rcv+0x29/0x40 [ 518.827734][T20655] netlink_unicast+0x531/0x710 [ 518.832522][T20655] ? netlink_attachskb+0x7c0/0x7c0 [ 518.837643][T20655] ? _copy_from_iter_full+0x25d/0x8c0 [ 518.843025][T20655] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 518.848753][T20655] ? __check_object_size+0x3d/0x437 [ 518.854851][T20655] netlink_sendmsg+0x8a5/0xd60 [ 518.859825][T20655] ? netlink_unicast+0x710/0x710 [ 518.864772][T20655] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 518.870444][T20655] ? apparmor_socket_sendmsg+0x2a/0x30 [ 518.875930][T20655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 518.882278][T20655] ? security_socket_sendmsg+0x8d/0xc0 [ 518.887776][T20655] ? netlink_unicast+0x710/0x710 [ 518.892736][T20655] sock_sendmsg+0xd7/0x130 [ 518.897171][T20655] ___sys_sendmsg+0x803/0x920 19:56:01 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r4, 0x0, 0x5}, 0x3c) openat$cgroup_type(r4, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r5 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r6 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 518.901865][T20655] ? copy_msghdr_from_user+0x440/0x440 [ 518.907347][T20655] ? __kasan_check_read+0x11/0x20 [ 518.912463][T20655] ? __fget+0x384/0x560 [ 518.916641][T20655] ? ksys_dup3+0x3e0/0x3e0 [ 518.921169][T20655] ? __fget_light+0x1a9/0x230 [ 518.925869][T20655] ? __fdget+0x1b/0x20 [ 518.930925][T20655] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 518.937211][T20655] __sys_sendmsg+0x105/0x1d0 [ 518.941801][T20655] ? __sys_sendmsg_sock+0xd0/0xd0 [ 518.941828][T20655] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 518.941843][T20655] ? do_syscall_64+0x26/0x760 [ 518.941856][T20655] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 518.941868][T20655] ? do_syscall_64+0x26/0x760 [ 518.941887][T20655] __x64_sys_sendmsg+0x78/0xb0 [ 518.972863][T20655] do_syscall_64+0xfa/0x760 [ 518.977389][T20655] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 518.983316][T20655] RIP: 0033:0x459a59 [ 518.987223][T20655] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 519.006974][T20655] RSP: 002b:00007f108cb2bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 519.015407][T20655] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 519.023391][T20655] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 519.031369][T20655] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 519.039484][T20655] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f108cb2c6d4 [ 519.047468][T20655] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff [ 519.072203][T20661] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 19:56:01 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r3, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:56:01 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:56:01 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) r7 = openat$cgroup_ro(r6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r7, 0x0, 0x5}, 0x3c) openat$cgroup_type(r7, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r8, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r8, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r9, 0x6, [], r10, r9, 0x1, 0x4}, 0x3c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r10, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r11, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r3, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:56:01 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04004000160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 519.212666][T20659] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 19:56:01 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:56:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04031800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 519.503304][T20693] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 19:56:02 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04041800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 519.705241][T20702] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 519.742630][T20702] CPU: 1 PID: 20702 Comm: syz-executor.2 Not tainted 5.4.0-rc1+ #0 [ 519.750578][T20702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.760645][T20702] Call Trace: [ 519.763957][T20702] dump_stack+0x172/0x1f0 [ 519.768306][T20702] sysfs_warn_dup.cold+0x1c/0x31 [ 519.773264][T20702] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 519.779372][T20702] sysfs_create_link+0x65/0xc0 [ 519.784162][T20702] device_add+0x75c/0x17a0 [ 519.788593][T20702] ? mark_lock+0xc2/0x1220 [ 519.793025][T20702] ? uevent_show+0x370/0x370 [ 519.797626][T20702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 519.803891][T20702] wiphy_register+0x1c46/0x2720 [ 519.808788][T20702] ? wiphy_unregister+0x1040/0x1040 [ 519.814003][T20702] ? __kmalloc+0x608/0x770 [ 519.818429][T20702] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 519.824246][T20702] ? lockdep_hardirqs_on+0x421/0x5e0 [ 519.829728][T20702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 519.835977][T20702] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 519.841626][T20702] ieee80211_register_hw+0x157e/0x3ac0 [ 519.847109][T20702] ? ieee80211_ifa_changed+0xde0/0xde0 [ 519.852587][T20702] ? memset+0x32/0x40 [ 519.856590][T20702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 519.862846][T20702] ? __hrtimer_init+0x13d/0x280 [ 519.867725][T20702] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 519.873473][T20702] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 519.879910][T20702] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 519.885821][T20702] hwsim_new_radio_nl+0x9e3/0x1070 [ 519.890950][T20702] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 519.896860][T20702] ? nla_memcpy+0xb0/0xb0 [ 519.901215][T20702] ? __nla_parse+0x43/0x60 [ 519.905655][T20702] genl_family_rcv_msg+0x74b/0xf90 [ 519.910786][T20702] ? genl_unregister_family+0x7b0/0x7b0 [ 519.916345][T20702] ? __kasan_check_read+0x11/0x20 [ 519.921379][T20702] ? __lock_acquire+0x16f2/0x4a00 [ 519.926417][T20702] ? __schedule+0x957/0x1e70 [ 519.931043][T20702] genl_rcv_msg+0xca/0x170 [ 519.935477][T20702] netlink_rcv_skb+0x177/0x450 [ 519.940253][T20702] ? genl_family_rcv_msg+0xf90/0xf90 [ 519.945549][T20702] ? netlink_ack+0xb50/0xb50 [ 519.950149][T20702] ? __kasan_check_write+0x14/0x20 [ 519.955275][T20702] ? netlink_deliver_tap+0x254/0xbf0 [ 519.960577][T20702] genl_rcv+0x29/0x40 [ 519.964569][T20702] netlink_unicast+0x531/0x710 [ 519.969354][T20702] ? netlink_attachskb+0x7c0/0x7c0 [ 519.974479][T20702] ? _copy_from_iter_full+0x25d/0x8c0 [ 519.979860][T20702] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 519.985590][T20702] ? __check_object_size+0x3d/0x437 [ 519.990805][T20702] netlink_sendmsg+0x8a5/0xd60 [ 519.995585][T20702] ? netlink_unicast+0x710/0x710 [ 520.000530][T20702] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 520.006094][T20702] ? apparmor_socket_sendmsg+0x2a/0x30 [ 520.011568][T20702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 520.017819][T20702] ? security_socket_sendmsg+0x8d/0xc0 [ 520.023287][T20702] ? netlink_unicast+0x710/0x710 [ 520.028246][T20702] sock_sendmsg+0xd7/0x130 [ 520.032681][T20702] ___sys_sendmsg+0x803/0x920 [ 520.037375][T20702] ? copy_msghdr_from_user+0x440/0x440 [ 520.042855][T20702] ? __kasan_check_read+0x11/0x20 [ 520.047899][T20702] ? __fget+0x384/0x560 [ 520.052076][T20702] ? ksys_dup3+0x3e0/0x3e0 [ 520.056511][T20702] ? __fget_light+0x1a9/0x230 [ 520.061220][T20702] ? __fdget+0x1b/0x20 [ 520.065330][T20702] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 520.071594][T20702] __sys_sendmsg+0x105/0x1d0 [ 520.076205][T20702] ? __sys_sendmsg_sock+0xd0/0xd0 [ 520.081255][T20702] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 520.086731][T20702] ? do_syscall_64+0x26/0x760 [ 520.091419][T20702] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.097499][T20702] ? do_syscall_64+0x26/0x760 [ 520.102205][T20702] __x64_sys_sendmsg+0x78/0xb0 [ 520.106987][T20702] do_syscall_64+0xfa/0x760 [ 520.111512][T20702] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.117410][T20702] RIP: 0033:0x459a59 [ 520.121309][T20702] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 520.140943][T20702] RSP: 002b:00007f108cb2bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 520.149370][T20702] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 520.157347][T20702] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 520.165322][T20702] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 520.173298][T20702] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f108cb2c6d4 [ 520.181275][T20702] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:56:02 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) [ 520.241182][T20706] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 19:56:02 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:56:02 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:56:02 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:56:02 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04005800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:56:02 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04051800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 520.606286][T20725] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 520.662560][T20725] CPU: 1 PID: 20725 Comm: syz-executor.2 Not tainted 5.4.0-rc1+ #0 [ 520.670498][T20725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.680564][T20725] Call Trace: [ 520.683902][T20725] dump_stack+0x172/0x1f0 [ 520.688258][T20725] sysfs_warn_dup.cold+0x1c/0x31 [ 520.693250][T20725] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 520.699342][T20725] sysfs_create_link+0x65/0xc0 [ 520.704122][T20725] device_add+0x75c/0x17a0 [ 520.708550][T20725] ? mark_lock+0xc2/0x1220 [ 520.712985][T20725] ? uevent_show+0x370/0x370 [ 520.717602][T20725] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 520.723869][T20725] wiphy_register+0x1c46/0x2720 [ 520.728762][T20725] ? wiphy_unregister+0x1040/0x1040 [ 520.733974][T20725] ? __kmalloc+0x608/0x770 [ 520.738399][T20725] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 520.744223][T20725] ? lockdep_hardirqs_on+0x421/0x5e0 [ 520.749524][T20725] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 520.755790][T20725] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 520.761443][T20725] ieee80211_register_hw+0x157e/0x3ac0 [ 520.766929][T20725] ? ieee80211_ifa_changed+0xde0/0xde0 [ 520.772401][T20725] ? memset+0x32/0x40 [ 520.776390][T20725] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 520.782638][T20725] ? __hrtimer_init+0x13d/0x280 [ 520.787509][T20725] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 520.793252][T20725] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 520.799685][T20725] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 520.805597][T20725] hwsim_new_radio_nl+0x9e3/0x1070 [ 520.810725][T20725] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 520.816629][T20725] ? nla_memcpy+0xb0/0xb0 [ 520.820979][T20725] ? __nla_parse+0x43/0x60 [ 520.825431][T20725] genl_family_rcv_msg+0x74b/0xf90 [ 520.830567][T20725] ? genl_unregister_family+0x7b0/0x7b0 [ 520.836125][T20725] ? __kasan_check_read+0x11/0x20 [ 520.841157][T20725] ? __lock_acquire+0x16f2/0x4a00 [ 520.846186][T20725] ? __dev_queue_xmit+0xbb5/0x3720 [ 520.851326][T20725] genl_rcv_msg+0xca/0x170 [ 520.855754][T20725] netlink_rcv_skb+0x177/0x450 [ 520.860525][T20725] ? genl_family_rcv_msg+0xf90/0xf90 [ 520.865822][T20725] ? netlink_ack+0xb50/0xb50 [ 520.870419][T20725] ? __kasan_check_write+0x14/0x20 [ 520.875547][T20725] ? netlink_deliver_tap+0x254/0xbf0 [ 520.880846][T20725] genl_rcv+0x29/0x40 [ 520.884844][T20725] netlink_unicast+0x531/0x710 [ 520.889624][T20725] ? netlink_attachskb+0x7c0/0x7c0 [ 520.894747][T20725] ? _copy_from_iter_full+0x25d/0x8c0 [ 520.900128][T20725] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 520.905859][T20725] ? __check_object_size+0x3d/0x437 [ 520.911074][T20725] netlink_sendmsg+0x8a5/0xd60 [ 520.915851][T20725] ? netlink_unicast+0x710/0x710 [ 520.920802][T20725] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 520.926357][T20725] ? apparmor_socket_sendmsg+0x2a/0x30 [ 520.931825][T20725] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 520.938068][T20725] ? security_socket_sendmsg+0x8d/0xc0 [ 520.943533][T20725] ? netlink_unicast+0x710/0x710 [ 520.948490][T20725] sock_sendmsg+0xd7/0x130 [ 520.952918][T20725] ___sys_sendmsg+0x803/0x920 [ 520.957627][T20725] ? copy_msghdr_from_user+0x440/0x440 [ 520.963104][T20725] ? __kasan_check_read+0x11/0x20 [ 520.968142][T20725] ? __fget+0x384/0x560 [ 520.972316][T20725] ? ksys_dup3+0x3e0/0x3e0 [ 520.976745][T20725] ? __fget_light+0x1a9/0x230 [ 520.981600][T20725] ? __fdget+0x1b/0x20 [ 520.985678][T20725] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 520.991932][T20725] __sys_sendmsg+0x105/0x1d0 [ 520.996529][T20725] ? __sys_sendmsg_sock+0xd0/0xd0 [ 521.001575][T20725] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 521.007045][T20725] ? do_syscall_64+0x26/0x760 [ 521.011734][T20725] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.017809][T20725] ? do_syscall_64+0x26/0x760 [ 521.022502][T20725] __x64_sys_sendmsg+0x78/0xb0 [ 521.027273][T20725] do_syscall_64+0xfa/0x760 [ 521.031787][T20725] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.037683][T20725] RIP: 0033:0x459a59 [ 521.041583][T20725] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 521.061195][T20725] RSP: 002b:00007f108cb2bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 521.069618][T20725] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 521.077601][T20725] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 521.085596][T20725] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 521.093579][T20725] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f108cb2c6d4 [ 521.101557][T20725] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff [ 521.122335][T20734] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 19:56:03 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04061800160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:56:03 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb04005a00160011000586f9835b3f2f009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 19:56:03 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 521.309868][T20742] sysfs: cannot create duplicate filename '/class/ieee80211/†ùƒ[?!' [ 521.370303][T20742] CPU: 1 PID: 20742 Comm: syz-executor.2 Not tainted 5.4.0-rc1+ #0 [ 521.378239][T20742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.388737][T20742] Call Trace: [ 521.392047][T20742] dump_stack+0x172/0x1f0 [ 521.396389][T20742] sysfs_warn_dup.cold+0x1c/0x31 [ 521.401335][T20742] sysfs_do_create_link_sd.isra.0+0x120/0x140 [ 521.407422][T20742] sysfs_create_link+0x65/0xc0 [ 521.412193][T20742] device_add+0x75c/0x17a0 [ 521.412209][T20742] ? mark_lock+0xc2/0x1220 [ 521.412225][T20742] ? uevent_show+0x370/0x370 [ 521.412241][T20742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 521.412265][T20742] wiphy_register+0x1c46/0x2720 [ 521.421068][T20742] ? wiphy_unregister+0x1040/0x1040 [ 521.421088][T20742] ? __kmalloc+0x608/0x770 [ 521.421106][T20742] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 521.452127][T20742] ? lockdep_hardirqs_on+0x421/0x5e0 [ 521.457438][T20742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 521.463699][T20742] ? ieee80211_cs_list_valid+0x1a1/0x280 [ 521.469353][T20742] ieee80211_register_hw+0x157e/0x3ac0 [ 521.474841][T20742] ? ieee80211_ifa_changed+0xde0/0xde0 [ 521.480322][T20742] ? memset+0x32/0x40 [ 521.484329][T20742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 521.490576][T20742] ? __hrtimer_init+0x13d/0x280 [ 521.495451][T20742] mac80211_hwsim_new_radio+0x20d9/0x4360 [ 521.501194][T20742] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 521.507621][T20742] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 521.513532][T20742] hwsim_new_radio_nl+0x9e3/0x1070 [ 521.518663][T20742] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 521.524565][T20742] ? nla_memcpy+0xb0/0xb0 [ 521.528912][T20742] ? __nla_parse+0x43/0x60 [ 521.533341][T20742] genl_family_rcv_msg+0x74b/0xf90 [ 521.538474][T20742] ? genl_unregister_family+0x7b0/0x7b0 [ 521.544032][T20742] ? __kasan_check_read+0x11/0x20 [ 521.549068][T20742] ? __lock_acquire+0x16f2/0x4a00 [ 521.554103][T20742] ? __dev_queue_xmit+0xbb5/0x3720 [ 521.559265][T20742] genl_rcv_msg+0xca/0x170 [ 521.563694][T20742] netlink_rcv_skb+0x177/0x450 19:56:03 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) [ 521.568469][T20742] ? genl_family_rcv_msg+0xf90/0xf90 [ 521.573767][T20742] ? netlink_ack+0xb50/0xb50 [ 521.578366][T20742] ? __kasan_check_write+0x14/0x20 [ 521.583504][T20742] ? netlink_deliver_tap+0x254/0xbf0 [ 521.588810][T20742] genl_rcv+0x29/0x40 [ 521.592803][T20742] netlink_unicast+0x531/0x710 [ 521.597580][T20742] ? netlink_attachskb+0x7c0/0x7c0 [ 521.602703][T20742] ? _copy_from_iter_full+0x25d/0x8c0 [ 521.608080][T20742] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 521.613812][T20742] ? __check_object_size+0x3d/0x437 19:56:04 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 521.619033][T20742] netlink_sendmsg+0x8a5/0xd60 [ 521.623818][T20742] ? netlink_unicast+0x710/0x710 [ 521.628768][T20742] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 521.634340][T20742] ? apparmor_socket_sendmsg+0x2a/0x30 [ 521.639811][T20742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 521.646061][T20742] ? security_socket_sendmsg+0x8d/0xc0 [ 521.651532][T20742] ? netlink_unicast+0x710/0x710 [ 521.656486][T20742] sock_sendmsg+0xd7/0x130 [ 521.660919][T20742] ___sys_sendmsg+0x803/0x920 [ 521.665605][T20742] ? copy_msghdr_from_user+0x440/0x440 [ 521.671066][T20742] ? __kasan_check_read+0x11/0x20 [ 521.676104][T20742] ? __fget+0x384/0x560 [ 521.680297][T20742] ? ksys_dup3+0x3e0/0x3e0 [ 521.684732][T20742] ? __fget_light+0x1a9/0x230 [ 521.689505][T20742] ? __fdget+0x1b/0x20 [ 521.693582][T20742] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 521.699835][T20742] __sys_sendmsg+0x105/0x1d0 [ 521.704441][T20742] ? __sys_sendmsg_sock+0xd0/0xd0 [ 521.709506][T20742] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 521.714985][T20742] ? do_syscall_64+0x26/0x760 [ 521.719679][T20742] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.725755][T20742] ? do_syscall_64+0x26/0x760 [ 521.730447][T20742] __x64_sys_sendmsg+0x78/0xb0 [ 521.735223][T20742] do_syscall_64+0xfa/0x760 [ 521.739738][T20742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.745636][T20742] RIP: 0033:0x459a59 [ 521.750235][T20742] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:56:04 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 521.769848][T20742] RSP: 002b:00007f108cb2bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 521.778271][T20742] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 521.786256][T20742] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 521.794242][T20742] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 521.802223][T20742] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f108cb2c6d4 [ 521.810207][T20742] R13: 00000000004c7b88 R14: 00000000004dda18 R15: 00000000ffffffff 19:56:04 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 521.854427][T20757] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 19:56:04 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2={0x1f, 0x8}, 0x5a, 0x0, 0x0, 0x0, 0xfffffc9f}, 0x0) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2040, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r8, 0x0, 0x5}, 0x3c) openat$cgroup_type(r8, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='rdma.current\x00', 0x0, 0x0) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000b80)=@nfc_llcp, 0xfffffffffffffe63, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f00000004c0)=""/121, 0x79}, 0x2040) openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r10, &(0x7f0000000100), 0xffffffffffffff3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004600)={&(0x7f00000033c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003440)=""/118, 0x76}, {&(0x7f00000034c0)=""/131, 0x83}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f00000045c0)=""/8, 0x8}, 0x10040) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x3, 0x3, 0x8, 0x9, 0x205, r10, 0x6, [], r11, r10, 0x1, 0x4}, 0x3c) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB='\a \x00\x00\x00\x00\x00\x00'], &(0x7f0000000740)='syzkaller\x00', 0xfffffffb, 0xf7, &(0x7f00000007c0)=""/247, 0x40f00, 0xc7887d6fef0614f0, [], r11, 0xb, r2, 0x8, &(0x7f00000008c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0xffff1bb6, 0x3490aff8, 0xfffff3ec}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r12, 0xd}, 0xfffffffffffffcc8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100), 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, 0x10000006, 0xbc2db3d}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3ff}}, 0xffffffffffffffe7) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, r4, 0x8, [], 0x0, r2, 0x5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) openat$cgroup_type(r2, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x4, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x6, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x4, 0x7c99c962, 0x7a, 0x5, 0x0, 0x10001, 0x4, @perf_config_ext={0x3f, 0x1f}, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r13 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0xf, &(0x7f0000000140), 0x4) 19:56:04 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 522.000358][ T46] ------------[ cut here ]------------ [ 522.001075][T20757] kobject: 'batman_adv' (00000000c1d71c60): kobject_add_internal: parent: 'wlan14', set: '' [ 522.005843][ T46] DEBUG_LOCKS_WARN_ON(1) [ 522.005939][ T46] WARNING: CPU: 1 PID: 46 at kernel/locking/lockdep.c:167 mark_lock+0x22b/0x1220 [ 522.005953][ T46] Kernel panic - not syncing: panic_on_warn set ... [ 522.036456][ T46] CPU: 1 PID: 46 Comm: kworker/u4:2 Not tainted 5.4.0-rc1+ #0 [ 522.043920][ T46] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.053991][ T46] Workqueue: writeback wb_workfn (flush-8:0) [ 522.059982][ T46] Call Trace: [ 522.063280][ T46] dump_stack+0x172/0x1f0 [ 522.067619][ T46] ? mark_lock+0x220/0x1220 [ 522.072120][ T46] panic+0x2dc/0x755 [ 522.076013][ T46] ? add_taint.cold+0x16/0x16 [ 522.080696][ T46] ? __kasan_check_write+0x14/0x20 [ 522.085808][ T46] ? __warn.cold+0x14/0x3c [ 522.090225][ T46] ? __warn+0xd9/0x1d0 [ 522.094297][ T46] ? mark_lock+0x22b/0x1220 19:56:04 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x7e43, 0x5, 0x80000000000000, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, r5, 0x0, 0x5}, 0x3c) openat$cgroup_type(r5, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x3, 0x0, 0x0, 0x801, 0x1, 0x2, 0x800, 0x3, 0x415f118c, 0x7, 0x104, 0x2, 0x1, 0x0, 0x3, 0x4, 0x0, 0x4, 0x0, 0x1, 0x101, 0x6, 0x4, 0x0, 0x0, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0x0, 0x7c99c962, 0x7a, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x8, 0x100000000000, 0x8, 0x4, 0x999f, 0x7}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00') ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000002c0)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@ax25={{0x3, @null}, [@netrom, @netrom, @rose, @null, @bcast, @remote, @rose, @netrom]}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/236, 0xec}], 0x1, &(0x7f0000000c00)=""/66, 0x42}, 0x2000) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f00000004c0)=""/88, 0x58}], 0x6, &(0x7f00000009c0)=""/214, 0xd6}, 0x60fba71e74ca3d67) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x4, 0x1f}, 0xc) r7 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x7, 0x1f, 0x78, 0x0, 0x0, 0x10000, 0x23f4bfd4f66397ec, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0xa, @perf_config_ext={0x2d, 0x6}, 0x8000, 0x8, 0x2, 0x4, 0x7fffffff, 0x8, 0xff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x0, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 522.098798][ T46] __warn.cold+0x2f/0x3c [ 522.103041][ T46] ? mark_lock+0x22b/0x1220 [ 522.107557][ T46] report_bug+0x289/0x300 [ 522.111891][ T46] do_error_trap+0x11b/0x200 [ 522.116480][ T46] do_invalid_op+0x37/0x50 [ 522.120904][ T46] ? mark_lock+0x22b/0x1220 [ 522.125412][ T46] invalid_op+0x23/0x30 [ 522.129573][ T46] RIP: 0010:mark_lock+0x22b/0x1220 [ 522.134684][ T46] Code: d0 7c 08 84 d2 0f 85 a8 0e 00 00 44 8b 1d 7d c7 6d 08 45 85 db 75 b6 48 c7 c6 60 15 ac 87 48 c7 c7 a0 15 ac 87 e8 9d 7f eb ff <0f> 0b 31 db e9 aa fe ff ff 48 c7 c7 20 c1 ae 8a e8 70 94 55 00 e9 [ 522.154285][ T46] RSP: 0018:ffff8880a9b478d0 EFLAGS: 00010082 [ 522.160378][ T46] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 522.168354][ T46] RDX: 0000000000000000 RSI: ffffffff815cb696 RDI: ffffed1015368f0c [ 522.170386][ T3900] kobject: 'loop4' (0000000068a78e33): kobject_uevent_env [ 522.176323][ T46] RBP: ffff8880a9b47920 R08: ffff8880a9b24480 R09: fffffbfff11f4069 [ 522.176330][ T46] R10: fffffbfff11f4068 R11: ffffffff88fa0343 R12: 0000000000000008 [ 522.176335][ T46] R13: ffff8880a9b24d68 R14: 0000000000000000 R15: 00000000000c119f [ 522.176356][ T46] ? vprintk_func+0x86/0x189 [ 522.176371][ T46] __lock_acquire+0x538/0x4a00 [ 522.176384][ T46] ? _raw_spin_unlock_irq+0x28/0x90 [ 522.176395][ T46] ? finish_task_switch+0x147/0x750 [ 522.176412][ T46] ? _raw_spin_unlock_irq+0x28/0x90 [ 522.209504][ T3900] kobject: 'loop4' (0000000068a78e33): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 522.211954][ T46] ? lockdep_hardirqs_on+0x421/0x5e0 [ 522.211967][ T46] ? mark_held_locks+0xf0/0xf0 [ 522.211978][ T46] ? __kasan_check_read+0x11/0x20 [ 522.211988][ T46] ? mark_lock+0xc2/0x1220 [ 522.212006][ T46] lock_acquire+0x190/0x410 [ 522.275818][ T46] ? __wake_up_common_lock+0xc8/0x150 [ 522.281203][ T46] _raw_spin_lock_irqsave+0x95/0xcd [ 522.286410][ T46] ? __wake_up_common_lock+0xc8/0x150 [ 522.291882][ T46] __wake_up_common_lock+0xc8/0x150 [ 522.297093][ T46] ? __wake_up_common+0x610/0x610 [ 522.302127][ T46] __wake_up+0xe/0x10 [ 522.306121][ T46] finish_writeback_work.isra.0+0xf6/0x120 [ 522.311934][ T46] wb_workfn+0x34f/0x1220 [ 522.316272][ T46] ? inode_wait_for_writeback+0x40/0x40 [ 522.321833][ T46] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 522.328173][ T46] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 522.333729][ T46] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 522.339723][ T46] ? trace_hardirqs_on+0x67/0x240 [ 522.344769][ T46] process_one_work+0x9af/0x1740 [ 522.349709][ T46] ? pwq_dec_nr_in_flight+0x320/0x320 [ 522.355082][ T46] ? lock_acquire+0x190/0x410 [ 522.359759][ T46] worker_thread+0x98/0xe40 [ 522.364266][ T46] kthread+0x361/0x430 [ 522.368337][ T46] ? process_one_work+0x1740/0x1740 [ 522.373538][ T46] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 522.380312][ T46] ret_from_fork+0x24/0x30 [ 522.386597][ T46] Kernel Offset: disabled [ 522.391047][ T46] Rebooting in 86400 seconds..