={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x5, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:07 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0406618, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:07 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x305, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:07 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0xc028660f, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:07 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r6 = openat$cgroup_ro(r2, &(0x7f0000000480)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x5, 0x7, &(0x7f0000000540)=@raw=[@map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, @exit, @ldst={0x2, 0x3, 0x0, 0x1, 0x9, 0xfffffffffffffff0, 0x4}], &(0x7f0000000300)='GPL\x00', 0x8, 0xc, &(0x7f0000000340)=""/12, 0x40f00, 0x2, '\x00', 0x0, 0x18, r5, 0x8, &(0x7f0000000400)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x3, 0x0, 0x8000005}, 0x10, 0x0, r6}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00043582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1684.782597][T25804] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1684.850266][T25804] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1684.908085][T25804] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:07 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x306, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:07 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0406619, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00063582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:07 executing program 3: close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) close(r5) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x46, 0x2, 0xff, 0x9, 0x0, 0x1, 0x800, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8, 0x1, 0x3, 0x9, 0x200000000000000, 0x6, 0x6, 0x0, 0x80000001, 0x0, 0x81}, r5, 0xf, r4, 0x4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r6, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:07 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0xc0286687, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:08 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x307, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1686.104058][T25828] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1686.121227][T25828] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1686.141811][T25828] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:09 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x6, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:09 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000340)='\x00\x00\x00\x00\xd1N]'}, 0xfffffffffffffc68) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x1, 0xff, 0x81, 0x80, 0x0, 0x1ff, 0x52, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x2, 0x637}, 0x4000, 0x6, 0x1, 0x0, 0x1000, 0x1, 0xe0, 0x0, 0x1, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x40000d) close(0xffffffffffffffff) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f00000006c0)={0x0, 0x800b, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r4, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:09 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0506617, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:09 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0xc0406618, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:09 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x308, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00093582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1686.821210][T25871] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1686.904744][T25871] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1687.004966][T25871] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:09 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='fsi_master_gpio_break\x00', r4}, 0x10) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x7a, 0x5, 0x4, 0x5, 0x0, 0x90, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfff, 0x4, @perf_config_ext={0x5f6, 0x9}, 0x200e, 0x80, 0x6, 0x0, 0x7, 0x9df, 0x2, 0x0, 0x2, 0x0, 0x1}, 0x0, 0x8, r5, 0x8) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x40000d) close(r6) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r7, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() [ 1687.159108][T25871] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:09 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x309, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:09 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0xc0406619, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:09 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc080661a, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00353582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:10 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) r5 = gettid() perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x2, 0x3f, 0x0, 0x0, 0x5, 0x10080, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x460, 0x9}, 0x1000, 0x5, 0x8001, 0x6, 0x5, 0x4, 0x2, 0x0, 0x9, 0x0, 0x1000}, r5, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r6, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() [ 1688.160977][T25903] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:11 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:11 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x30a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:11 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0xc0506617, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:11 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0c0583b, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a005a3582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:11 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a4ff0100006db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() [ 1688.844190][T25938] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a005b3582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:11 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400000) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:11 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x30b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:11 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) 08:45:11 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0xc080661a, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:12 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x30c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1690.191047][T25963] validate_nla: 6 callbacks suppressed [ 1690.191068][T25963] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1690.232871][T25963] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1690.266029][T25963] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:13 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x8, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:13 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000f) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:13 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0xc0c0583b, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:13 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:13 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x30d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a006c3582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1690.964646][ T221] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1691.130524][T26009] netlink: 'syz-executor.0': attribute type 16 has an invalid length. 08:45:13 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400010) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:13 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x30e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1691.262388][T26009] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1691.379959][T26009] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:13 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400000) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:14 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.limit_in_bytes\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000008c0)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d00700000031e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a4a6c2a0bf797be7b24156fe305f75ae8b27ebcc8c4cd10461ed2a3d90000bfeccbbf799403a40928a73c0000a2836dbcb2d80aaeecec94a0b49cb9f7549f88fb708c165a7f7ffd5cd9ff3a5f5d4169e14c44d519050cd6752836d243620f7d76fd1a0b316913f4a89c329a89b03a36b1a180fa1bc8629ba13aeb3808320ad2ae3af7a949afe8c230b1b9de08f49d87cd8d20fa1759e98348f6f919903c16b2340e7f2b5b750cdba46fa90550872d7d463cddff4e1a732c978c356ff76677eb9df9e5ac0d23cf1b08149a73fea0198575e67883bc72751bfe1778c0afbfd6b85e301d7ec78a9de78b2fccd01228a9c907e9a55a608a7f6030978013b14d7ef85afcf83ecef516764b5c9ad71c685d63f503d95399762e27ccdb416645f1f3cdd0301705ef6613f8dfa5e96132b18e1027e6c18409efb2127b2d05ad6a18f28b5ca4b116b34ca213be2324d6cb9741e999d3d33b61b74ee1745ad6b1e95195b71f7df7f3e416d21924e1ae6ca3123b2011c1cd5461c834e3ee71c8ab75c55a0f2ee75c7aa77821450d37649067ac4f8120cdadbbde298f1b218473446fa226a1a34465f42cbd"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000540), 0x2bf70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='net_prio.prioidx\x00', 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00050282c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:14 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x30f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1692.469397][T26038] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1692.484734][T26038] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1692.513883][T26038] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:15 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:15 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400044) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:15 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0xc028660f, &(0x7f00000005c0)=0x40000002b) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYRESDEC=r6], &(0x7f0000000280)='syzkaller\x00', 0x4, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:15 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000f) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:15 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x310, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00050382c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1693.135056][T26079] netlink: 'syz-executor.0': attribute type 16 has an invalid length. 08:45:15 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x311, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1693.252720][T26079] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1693.341824][T26079] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:15 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40005d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:16 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, &(0x7f00000005c0)=0x40000002b) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x0, 0xff, 0x81, 0x7, 0x0, 0x400, 0x40000, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000002c0), 0x2}, 0x820, 0x2, 0x37, 0x8, 0x14, 0x2, 0x7fff, 0x0, 0x4, 0x0, 0x5}, 0x0, 0x5, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00050482c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:16 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400010) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:16 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x312, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1694.660295][T26102] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1694.676999][T26102] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1694.696162][T26102] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:17 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xb, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:17 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x401000) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:17 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa41e28ff51e8d6559c242abf7a57257f4c0844b2ce712385cff50a2b13fc17c91f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75a9a35d88cc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7ea15df64c44cb91a1a7af06b4e3ae495c553728d9abdb4c708d9ff831570af5a75eb9556159cb7ff3e2e246cc4"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r6, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:17 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400043) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:17 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x313, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00050582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1695.412940][T26143] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1695.525228][T26143] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1695.626744][T26143] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:18 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, &(0x7f00000005c0)=0x40000002b) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.stat\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:18 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x314, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:18 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x4af000) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:18 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40005d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00050682c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:18 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x315, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1696.697529][T26174] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1696.718905][T26174] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1696.755643][T26174] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1696.825164][T26174] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1696.844374][T26174] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1696.870018][T26174] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:19 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:19 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)=@isdn={0x22, 0x9b, 0x1, 0x5, 0x1}, 0x80, &(0x7f0000000340)=[{&(0x7f00000004c0)="6d03cfbfa5a695d69a555aa2fb63074af46148bc1e95f18fecf1889c4ce082746e538074e0265565fbea27d7f34d9d50d92309073067c1c3be6ddad804d2b8500c92c8cb8a6eaaa59811df57ee0fa4364b2fe9baf1314e2de5e7660de4ebc7dbbce45edfb0c0dd2255c4ca16b6d33603b6e01989bca15b92b2ea56a9c4731e54", 0x80}], 0x1}, 0x4044000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0xc}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:19 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x4fd000) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:19 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x316, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:19 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x401000) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00050782c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1697.547466][T26212] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1697.645508][T26212] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 08:45:20 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x317, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1697.744798][T26212] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:20 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x4af000) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:20 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x541000) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00050882c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:20 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x318, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:20 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000006000000bef7532f13732946d06b164bcc23e1d95dae6fcfa47a57257f4c0844b2ce742385cff50a2b13fc83a45da6d29952a9cab849128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8090010461cd2a3d90000bfedcbd9799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() [ 1698.761663][T26235] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1698.791121][T26235] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1698.826476][T26235] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:21 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xd, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:21 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x4fd000) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:21 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x970000) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:21 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x319, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:21 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c3e, 0x60c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp, 0x0, 0x2000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xd1, 0x8, 0x0, 0xa9, 0x0, 0x80000000, 0x8000, 0xc, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000300), 0x1}, 0x2694, 0x3f, 0x200, 0x8, 0x1, 0x7, 0x6, 0x0, 0x3, 0x0, 0xffff}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00050982c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1699.514487][T26274] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:22 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@cgroup=r1, r0, 0x1b, 0x1}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r6 = openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000300), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0xc, 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x11, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x6}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:22 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x31a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:22 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x14ac000) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00050a82c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:22 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x541000) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:22 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x7fffffffefff) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() [ 1700.670994][T26292] validate_nla: 2 callbacks suppressed [ 1700.671020][T26292] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1700.705663][T26292] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1700.727113][T26292] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:23 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xe, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:23 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x31b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:23 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x40, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xc598, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r3, 0xc0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x101, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x5, 0x1}, 0x0, 0x0, &(0x7f0000000340)={0x3, 0x4, 0x1, 0x80}, &(0x7f0000000400)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x40}}, 0x10) close(r4) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000540)='tasks\x00', 0x2, 0x0) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:23 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x970000) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:23 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6611, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00050b82c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1701.303689][T26333] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1701.370470][T26333] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 08:45:23 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x31c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1701.447232][T26333] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1701.545515][T26333] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1701.580368][T26333] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 08:45:24 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x14ac000) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() [ 1701.667344][T26333] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:24 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db700"/124], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() write$cgroup_int(0xffffffffffffffff, &(0x7f0000000540), 0x2bf70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000002c0)={0xffffffffffffffff, r1, 0x6}, 0x10) 08:45:24 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000340)='\x00') r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r3 = gettid() perf_event_open(&(0x7f00000002c0)={0x6, 0x80, 0x1, 0x6, 0x7, 0x81, 0x0, 0x100000000, 0x904, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xe42, 0x4, @perf_bp={&(0x7f00000001c0), 0x6}, 0x2008, 0x7fffffff, 0x8, 0x0, 0x101, 0x1000, 0x542, 0x0, 0x3, 0x0, 0x2}, r3, 0x10, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x13, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) openat$cgroup_ro(r1, &(0x7f0000000240)='rdma.current\x00', 0x0, 0x0) gettid() 08:45:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00050c82c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:24 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x31d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1702.653316][T26371] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1702.677291][T26371] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1702.703699][T26371] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:25 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xf, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:25 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x7fffffffefff) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:25 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f000000e680)={&(0x7f000000e440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e640)=[{&(0x7f000000e4c0)=""/90, 0x5a}, {&(0x7f000000e540)=""/53, 0x35}, {&(0x7f000000e580)=""/53, 0x35}, {&(0x7f000000e5c0)=""/83, 0x53}], 0x4}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f000000ee40)={&(0x7f000000e6c0)=@xdp={0x2c, 0x8, r1, 0x5}, 0x80, &(0x7f000000ec00)=[{&(0x7f000000e740)="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", 0xfe}, {&(0x7f000000e840)="94ad51c6d4e5ee8423b15773e68bbf56a53332e0e96b30dc3e501591edbbfaa903495de2c293c0550a85bfff544d778d9ae3f60ac7409954fd59a5fd31c369778abe6936f5df159e26d1d482683d5997b6d2ad8e4011fd3add2284fa7ee9b9f0129c43452b89c0ff3199c2e3588e3229729df6dbb6a125e6d273606c75283a007510e08d21127a228ce654a19bf9db2da9272094eff7f0660f9f9cef36", 0x9d}, {&(0x7f000000e900)="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", 0xfd}, {&(0x7f000000ea00)="ef72432c4b4a4aa7b22b9a954216f1049d6ad52efd33f1a227e2f578690e9cd10d34ce7aa3f852b4319f563ae4a45f02691309354de02f667ca7dcb171feaea976f38db2cce356d54881f5a9a379d7eaa2f3bb46cb2e6552b935572ba45af27ee04d690c996247059fa373eab4c8b021a43b8f13e2a02bbd167d421d7fac265d8ae64f86d3a4c2e01440b995d067b7242a77c2880b18359b60c6c8f78ccbf5e9b1a5d4b849acba0501e128a1ba595e0191239a888c68b0cdcfd5a044621e81361b0be9ba67ca47e0907e449c3b9dbcac02b8826af15582f955df18c5ee5b9b632234b61bf1baa8f52f9041d2261e37c7bfcc", 0xf2}, {&(0x7f000000eb00)="0c4bacd83026dd34f89cc82bcc2434da28e485", 0x13}, {&(0x7f000000eb40)="0a8d8bbe97c59c01843e498528c93726197ffb0703a0e0b000b7bd33233ce9c64d079b370f6f040f851bc9de2428920bcc631fa4d51349a02a48c802bc", 0x3d}, {&(0x7f000000eb80)="77aa4d2b58d197877da9bc4a6675e4712c58e477b963349ef59c9310ee61f257d2ec3a82c65d3e04e9347e998c327837db2141b94efb76ecbaae29b22fe5b166298b18811eade60e", 0x48}], 0x7, &(0x7f000000ec80)=[{0xf0, 0x0, 0x80000, "098f47998548219705fb7f226711118bf900d0494a4d9e46b273fa6f41d166d36587e6ae624004a7dac2a8b91c1c2a355c90458cf89362f47c053420be61fcfbebfc1115f84db13d455412127a770b0aed2137b984a735ce46942cef3ae807e0dafe2db28853454f488ac1d66655eb114efff797070a56f21e1b71945a443945222529f94d4fafa16a870adfd4ddd7fa3ea954a2670465bac36ef634770d4b0bd7817cca476a4dd4029af1a18b07c35245b36fa7329d76ef207a9f8c3f1acb15c4d3c7f464fc910f7ab3434ae8142438639c298e3637d0566ac0e089"}, {0x98, 0x1e, 0x5, "44226104ab3a9bdd8f2ed7c162d8273ac2f7123b98dba4fff07f170d5655a583844466bc23d5beadeb3e7d79c3aa5571a1475f7b989363174ee9f01130673caa91e50cf6e64828126c78be46c45a6fcf16a7037abb3034076d0dd31b894d6deb45e8d8bf84f61547b058147a35d11f08fc2c1ddfc236cdf1be85895d6f00ed8bf1"}], 0x188}, 0x40001) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r2, &(0x7f00000000c0), 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) close(r5) openat$cgroup_subtree(r3, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b1601cc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198ef5f04b48c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r6, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:25 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x31e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:25 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x81, 0x8e, 0x4, 0x7, 0x0, 0x40, 0x4040, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xf5, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x20, 0x80000, 0xcb1, 0x1, 0x7fff, 0x6, 0x40, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x6, r0, 0x8) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00050d82c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1703.300136][T26399] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1703.384983][T26399] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1703.450108][T26399] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1703.479619][T26399] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:26 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x9, 0x8, 0x3, 0x81, 0x0, 0xfff, 0x20044, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80, 0x2, @perf_bp={&(0x7f0000000240), 0xe}, 0x1, 0x5, 0x80, 0x2, 0x6e3, 0x1, 0x80, 0x0, 0x3, 0x0, 0x5}, r0, 0x1, r1, 0x9) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x20, 0x6, 0xfe, 0x2, 0x0, 0x44d7, 0x61, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x7, @perf_config_ext={0x7, 0x4}, 0x40, 0xffffffffffffff0a, 0x8000, 0xf, 0x9991, 0x10000, 0x4a, 0x0, 0x0, 0x0, 0x269c}, r0, 0xd, r1, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r2, &(0x7f00000000c0), 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="290000080d000000a56c16bef7532f13732946d06b5b164bcd31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45dc2126c493cbf2829a3716c50626c2a8b3d62f17f24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000000000000000"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:26 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x31f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:26 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r5, &(0x7f0000000540), 0x2bf70) openat$cgroup_ro(r5, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) gettid() 08:45:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00050e82c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:26 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000002c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:26 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1704.671036][T26422] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:27 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:27 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(r3, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x6611, 0x0) openat$cgroup_ro(r4, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup(r4, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa4712385cff50a2b13fc83a45da6d29949128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75a06000000000000000000000000007c83bae9df85040357e69542f74c476e04de1ef3e90bd979187edebaed4e40a38a67794751f371"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:27 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000300)='\x00\x0eg>\xd3\xed.D\xc2\xe0\x8b2\x9e\x9b\x83\xc2O\xe1\xae\xa3\\\xc4\xd0\t\xa8\xd2\xfe\x86\xbcg\x9dpj\xe24\xc9\xa3\x19\xdd\xef\xb5?p\x1f_\xe5\xda\x17l\a'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000540), 0x2bf70) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map=0x1, 0xffffffffffffffff, 0x6}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:27 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x80, 0xff, 0x7, 0x20, 0x0, 0x9, 0x800c2, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x280, 0xce}, 0x12310, 0x0, 0x36, 0x8, 0x200, 0x2, 0x9, 0x0, 0xc4, 0x0, 0x9b}, 0xffffffffffffffff, 0x4, r4, 0x2) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:27 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x321, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00050f82c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1705.508862][T26468] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:28 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x322, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00051082c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:28 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:28 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xc76}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x6, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x4, 0x80, 0x81, 0x4, 0x6, 0x9, 0x0, 0x9, 0x40000, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0xfffffffffffff000, 0x1ff}, 0x40002, 0x6, 0x7, 0x0, 0xff1, 0xfffffff9, 0x80, 0x0, 0x3, 0x0, 0x7}, 0x0, 0x4, 0xffffffffffffffff, 0x8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@cgroup=r2, r0, 0x21, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) openat$cgroup_subtree(r3, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r6, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() [ 1706.157961][ T110] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1706.187472][T26489] validate_nla: 6 callbacks suppressed [ 1706.187497][T26489] netlink: 'syz-executor.0': attribute type 16 has an invalid length. 08:45:28 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() [ 1706.287757][T26489] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 08:45:28 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x323, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1706.353372][T26489] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:29 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x17, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a900002198178049128c1f644a473cbf2829a3716c50624a6c2a0b489244d024156fe3aff7bcc8c4cd10461cd2a3d90000000000f414d038a11ebc63e41b9991e5d80a87ed42dbc80ec4dc2462ca2e3a98de369c007d4346ca9eda3e36ba6f03dec606b18f313e68cef2fbf6b76beabe7269bb721aeaec297912b30c92f0ec95d4ea2551fcd601323d28bcb48bc239252ad1fcc9038354b4ed44ad7ace4c2652268ff3af9ddb11b15e4f03f3047e04f65d39d0ad59fd943a7d221fe860855496c8514788617477e3885c8fa30f30d4674e01e0d7648157fadb575f89f8658a10d0962af1c94a7c448b1d"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:29 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) openat$cgroup_ro(r4, &(0x7f00000002c0)='memory.stat\x00', 0x0, 0x0) close(r5) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d0e0000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r6, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:29 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x40000002b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00051182c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:29 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x324, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1707.472713][T26530] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1707.540887][T26530] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 08:45:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() r4 = gettid() perf_event_open(&(0x7f0000002a80)={0x0, 0x70, 0xfa, 0x3, 0x7, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x0, 0x80, 0x101, 0x2, 0x0, 0x3, 0x6, 0x8}, r4, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x7f, 0x3f, 0x98, 0x0, 0x25b, 0x301, 0xc, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x4, @perf_bp={&(0x7f00000001c0), 0xc}, 0x8001, 0x1000, 0x1000, 0x2, 0x80000001, 0x9, 0x7, 0x0, 0xa42a, 0x0, 0xfffffffffffeffff}, r4, 0xf, r3, 0x2) [ 1707.751176][T26530] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:30 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x325, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:30 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000540), 0x2bf70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='net_prio.prioidx\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7732f1373298ad06b164bcc31e1d95dae6fcfa47a57257f4c0844b29952a9ca1810d3a98939fe7dc2843d0b81abb82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() [ 1707.875587][T26530] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1707.908827][T26530] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1707.962815][T26530] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:30 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) openat$cgroup_ro(r4, &(0x7f0000000340)='cpuacct.usage_all\x00', 0x0, 0x0) close(r4) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r6 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r6}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00051282c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:30 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x326, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1708.912825][T26563] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1708.930281][T26563] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1708.959324][T26563] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:32 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x19, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c46210461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:32 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b, 0x1}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000540), 0x2bf70) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="2d85fa82c79290669a5ddc927969c9351615e361a4e896d1f07a178ad30651e93fb1a769e33dd552f9b81149550643a0df8d9b9c06a44750eb96b201f8919d2b3a38fc381d282ea569ea73d9d6c9d152b8e3242348c6224297d99c4fc5a5c974698430c00432c9c2aa735df40626e56e76af3d4faa314f"], 0x5) r1 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(r2, &(0x7f0000000200)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797aff75ae8b27ebcc8c4cd10461cd2a3d9001c93e7d9a15fc259a40928a73cedb7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r4, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:32 executing program 1: perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x200, 0x0, 0x0, 0x7, 0x7, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000002a80)={0x0, 0x70, 0xfa, 0x3, 0x7, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x0, 0x80, 0x101, 0x2, 0x0, 0x3, 0x6, 0x8}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x80, 0x6, 0x5, 0x7f, 0x5, 0x0, 0x98, 0x42900, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_config_ext={0x1}, 0x8001, 0x81, 0x2, 0x9, 0x5, 0x3ff, 0x9, 0x0, 0x1f, 0x0, 0x6b1a}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0x0, 0x81, 0x8, 0x0, 0xd3, 0xd024, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000440), 0x4}, 0x1, 0x1, 0x2, 0x0, 0x8000008, 0x0, 0xffff, 0x0, 0x80, 0x0, 0x3}, 0x0, 0x3, r1, 0x9) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41100, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x3}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:32 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x327, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00051382c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1709.753054][T26597] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1709.817194][T26597] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 08:45:32 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x328, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1709.916506][T26597] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:32 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r3}, 0x8) close(r5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x12, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x60, &(0x7f00000003c0)=""/96, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:32 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c5062266c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x94, 0x94, 0x3, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @union={0xf, 0x5, 0x0, 0x5, 0x1, 0x5, [{0xa, 0x0, 0x2}, {0xa, 0x4, 0x5f}, {0x9}, {0xc, 0x3, 0x3}, {0xc, 0x0, 0xe033}]}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x67, 0x0, 0x66, 0x2}, @var={0x10, 0x0, 0x0, 0xe, 0x4}, @restrict={0x5, 0x0, 0x0, 0xb, 0x4}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x37, 0x0, 0x2, 0x1}]}, {0x0, [0x30]}}, &(0x7f00000003c0)=""/89, 0xaf, 0x59, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1, 0x4, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, [@alu={0x4, 0x0, 0x6, 0x0, 0x16, 0xfffffffffffffff8, 0x1}]}, &(0x7f0000000240)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x1, r5, 0x8, &(0x7f0000000500)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x9, 0x0, 0x2}, 0x10, 0xffffffffffffffff, r4}, 0x78) 08:45:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00051482c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:32 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x329, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1710.860868][T26623] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:33 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1b, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.stat\x00', 0x100002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000300)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f00000002c0), 0x4345a) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r2) gettid() 08:45:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x0, 0x0) perf_event_open(&(0x7f00000006c0)={0x2, 0x80, 0x1, 0x7, 0x4, 0xa5, 0x0, 0x9, 0x100, 0xe, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x100, 0x4, @perf_config_ext={0x1, 0x9}, 0x4800, 0x401, 0x3, 0x4, 0x80000000, 0x1, 0x0, 0x0, 0x80000001, 0x0, 0x4}, 0xffffffffffffffff, 0x2, r3, 0x1) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x51, 0x8, 0x0, 0x80, 0x0, 0xfffffffffffffff7, 0x80048, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xffff, 0x1, @perf_bp={&(0x7f00000001c0), 0x2}, 0x4004, 0x1f, 0x3, 0x9, 0x5, 0x5, 0x1e, 0x0, 0x3c, 0x0, 0x100}, 0x0, 0xc, r2, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b6ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c070000002a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={r4, &(0x7f00000003c0)="8d25363668c5e822411a4419d759b523531ba18fa3479190ff989dd956cb1681213d44a2302fce0730ef1101531b1db0fb7d2e9fa74c02801c96751af0c3fd1e98363c2402c7739ef5383470cbba3e7edeb9fa9f9b11314a29ec", &(0x7f00000004c0)=""/136}, 0x20) 08:45:33 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) perf_event_open(&(0x7f0000002a80)={0x0, 0x80, 0xfa, 0x3, 0x7, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x0, 0x80, 0x101, 0x2, 0x0, 0x3, 0x6, 0x8, 0x0, @perf_config_ext={0xdb, 0x4}, 0x1005, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x7a, 0x3, 0xc4, 0x5, 0x0, 0x8, 0x102, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000002c0), 0x8}, 0x2420, 0x0, 0x0, 0x7, 0x1, 0x0, 0x8f, 0x0, 0x1, 0x0, 0x4}, 0x0, 0x2, r0, 0x8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:33 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x32a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00051582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1711.554152][T26662] validate_nla: 2 callbacks suppressed [ 1711.554177][T26662] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1711.672250][T26662] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1711.716986][T26662] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:34 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x7, 0xd, 0x80, 0xff, 0x0, 0xd3e, 0x2040, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x4, @perf_bp={&(0x7f0000000340), 0x8}, 0x44248, 0x32, 0x8, 0x7, 0xfffffffffffffffb, 0x3, 0x101, 0x0, 0x5da155b6, 0x0, 0xffffffffffffff93}, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, r0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xe14e) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000240)={0x0, r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x3, 0x6b, 0x0, 0x9, 0x0, 0x6, 0x86000, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x891a, 0x2, @perf_bp={&(0x7f00000001c0), 0x2}, 0x10000, 0xfffffffffffffff9, 0xfffffff9, 0x2, 0x4, 0x5b, 0x6, 0x0, 0x3f, 0x0, 0x1ff}, 0x0, 0xc, r3, 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r7 = openat$cgroup_ro(r5, &(0x7f00000004c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x40000a) close(r6) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="299c00080d000000a56c0cbf1ae5cab7b41e8016bef75369d97c7946d06b164ba47a57257f4c0844b2cc712385cff50a2b13fc83a400a6929952a9cab82198e20300008c1f644a473cbf2829a3716c50624a6c2a0bf797d4016943a17d8afb5ae8b27ebcc8e0a730d4c1e73103c956692dc8fb890000000000000000"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:34 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x32b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00051682c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:34 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000000)) close(r3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x81, 0x80, 0x1, 0x81, 0x0, 0x7f, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffff9, 0x1, @perf_bp={&(0x7f0000000280), 0x1}, 0x1, 0xffff, 0x5, 0x1, 0xa5d, 0x2, 0x81, 0x0, 0x5, 0x0, 0x3}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) gettid() 08:45:34 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000540), 0x2bf70) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)={[{0x2d, 'rdma'}, {0x2d, 'rdma'}, {0x2b, 'io'}, {0x2b, 'memory'}, {0x2b, 'pids'}]}, 0x1e) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:34 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x32c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1713.216178][T26682] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1713.248602][T26682] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1713.256756][T26682] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:36 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1d, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:36 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305839, &(0x7f0000000000)) recvmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/96, 0x60}, {&(0x7f00000006c0)=""/206, 0xce}, {&(0x7f00000007c0)=""/252, 0xfc}], 0x3, &(0x7f00000008c0)=""/222, 0xde}, 0x40012040) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:36 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) r4 = openat$cgroup(r1, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000440)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) close(r5) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d0257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1fea116698bf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbfc8a798a3bfacf287f0abae73f9c5f7b7ca5f06a9dc6a0d17417b93c7c5799403a40928a73c6db7d371f7e539f2a5bc6da2fe177d731b39cd4a18b63a7fd52ef17bf51923648b49efdffa7091c848ba90a2b9667ef0001e63ebbcf59aa19eb3aad9ec9fafdc"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r6, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:36 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x32d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:36 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz1\x00', 0x200002, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0xa, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfa}, [@generic={0x0, 0x9, 0xf, 0x5, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6e}, @alu={0x7, 0x1, 0xb, 0x2, 0x8, 0x10, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x0, 0x0, 0x9, 0xc, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}]}, &(0x7f0000000500)='GPL\x00', 0x9, 0x3e, &(0x7f0000000540)=""/62, 0x41000, 0x35, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0x10, 0x7, 0x1}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0x5, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0xd91}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f0000000340)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x18, '\x00', 0x0, 0x11f7b84ee974610f, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x5, 0x7, 0x3}, 0x10, 0xffffffffffffffff, r4}, 0x78) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00051782c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1713.880349][T26726] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1713.933239][T26726] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1714.025262][T26726] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:36 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x32e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:36 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) openat$cgroup_subtree(r1, &(0x7f0000000240), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000300)='cpuacct.usage_all\x00', 0x0, 0x0) 08:45:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00051882c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:37 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup(r4, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x40000d) close(r6) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a98da5a0cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfed3b749cc677e2f434cbbf799403a40928a73c6db7926ac1bb45f2945be1433b8ba7eb3f901635f3d10ac0c8763a8197beba0efa3d4d929e1cf2753281a0953df213"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r7, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) gettid() 08:45:37 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x20}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:37 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x32f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1715.394803][T26753] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1715.411093][T26753] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1715.438940][T26753] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:38 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1e, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1d, 0x1, &(0x7f00000001c0)=@raw=[@exit], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x3, 0x6, 0xb39}, 0x10}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x1, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:38 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x330, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:38 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000002c0)='devices.list\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:38 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r4, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) gettid() 08:45:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00051982c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1716.095045][T26792] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1716.205178][T26792] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1716.307850][T26792] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:38 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x331, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:39 executing program 2: perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x3}, 0x49782, 0x3, 0x0, 0x1, 0x4, 0x2, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x38, &(0x7f0000000400)='\x00\x00\x00\x12\x00\x00\x00\xf1\b\xd3\x9b\xf8\xdb\xc5`W\x13K\x12\xac_>d\x8d\x83\xdb\xa3mtT3.\x1d\x01=\xd1\xcaBa\x00\x00\x00\x00\x00\x00\x00\x01u(\x88\xee\xfe\x90\xbe\x8fS'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000340)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x40000d) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpu.stat\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000540), 0x2bf70) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x2, 0x3, 0x81, 0x2, 0x0, 0x4, 0x42000, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x8}, 0x4, 0x3, 0x1, 0x4, 0x3ff, 0x5, 0xfe76, 0x0, 0x1, 0x0, 0xfff}, 0x0, 0xa, r2, 0x9) close(r1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0)={r1}, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r3) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f1373295ad06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000003c0)={0xffffffffffffffff, 0x24, 0x0, 0x2, &(0x7f0000000180)=[0x0], 0x1}, 0x20) gettid() 08:45:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00051a82c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1716.482975][T26792] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:39 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x40000002b) write$cgroup_subtree(r4, &(0x7f00000002c0)={[{0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'io'}, {0x0, 'rdma'}, {0x2d, 'io'}, {0x2d, 'rdma'}, {0x2b, 'pids'}]}, 0x25) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:39 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) [ 1716.715413][T26811] validate_nla: 2 callbacks suppressed [ 1716.715436][T26811] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1716.836263][T26811] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1716.894518][T26811] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:39 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x332, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:40 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x21, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:40 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1640000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f00000001c0)=0x400000763) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00051b82c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:40 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_ro(r0, &(0x7f00000002c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000002a80)={0x0, 0x80, 0xfa, 0x7, 0x7, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x0, 0x80, 0x101, 0x2, 0x0, 0x3, 0x6, 0x8, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xa, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xff, 0xf8, 0x7, 0x1, 0x0, 0xffffffff, 0x21224, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x3}, 0x0, 0x4, 0x2, 0x9, 0x7, 0x4, 0x3ff, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xb, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x64, &(0x7f0000000580)=""/86, 0x41100, 0x0, '\x00', 0x0, 0x23, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:40 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup(r1, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(r4, &(0x7f0000000300), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) close(r5) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r6, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:40 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x333, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1718.497680][T26858] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1718.568023][T26858] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 08:45:41 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x334, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1718.677046][T26858] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:41 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2d9712385cff50a2b13fc83a45da6d29952a9cab83e98178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:41 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='io.max\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:41 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00051c82c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:41 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x335, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1719.915095][T26888] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1719.942788][T26888] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1720.008925][T26888] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:43 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x22, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:43 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='io.stat\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b213fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe304f75ae8b27ebcc8c4cd10461cd2a3d9000000000000000000"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:43 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x336, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:43 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x38c0, 0x3, 0xfffffffd, 0x7}, 0x0, 0x4002, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) close(r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@cgroup=r1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) openat$cgroup_ro(r3, &(0x7f0000000300)='freezer.state\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:43 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d007136d4931e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f5f3f3e5399a22eda167f78644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7f13155fdde9572130b3bb88410213b32111916bc77f629d3f2928429d778e03beb8684f4edbe16fad2117d9edef44d15728d32bb2d5bf7bd7648d0ebefc248a7bf4232cd53e02f585706ecf6e98db6708a11698091999efccc5af0f1e737d4f949f600abad18"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00051d82c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1720.746454][T26924] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1720.851979][T26924] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 08:45:43 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x337, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1720.940588][T26924] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1721.090353][T26924] netlink: 'syz-executor.0': attribute type 16 has an invalid length. 08:45:43 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r5 = socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg(r5, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f00000025c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', r6, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() [ 1721.170224][T26924] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 08:45:43 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x3f, 0xe3, 0x80, 0x5, 0x0, 0x9ca, 0x80000, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x46, 0x1000}, 0x43822, 0x400, 0xffff, 0x6, 0x8, 0x3, 0x20, 0x0, 0x1, 0x0, 0x32}, r3, 0x8, r2, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r2, 0xc0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x9e6, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x0, 0x2}, 0x0, 0x0, &(0x7f00000004c0)={0x4, 0xa, 0x48c, 0xd7}, &(0x7f0000000500)=0xcedf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x8}}, 0x10) gettid() [ 1721.214317][T26924] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:43 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x80, 0x0, 0x3f, 0x7f, 0x81, 0x0, 0x3, 0x400, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffc, 0x1, @perf_bp={&(0x7f0000000240)}, 0x40040, 0x7, 0x80000001, 0x1, 0x1, 0x1, 0xff, 0x0, 0x0, 0x0, 0xfff}, 0xffffffffffffffff, 0x10, r0, 0xa) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x2, 0x80, 0x0, 0x81, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x80000000, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x0, 0x0, 0x1ff, 0x1, 0x6, 0x300, 0x2, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0x6, r1, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r2, &(0x7f00000000c0), 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00051e82c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:44 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x338, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1722.107618][T26952] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1722.126150][T26952] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1722.140683][T26952] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1722.179861][T26952] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1722.210179][T26952] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1722.218295][T26952] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:45 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x23, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:45 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xc4f7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080), 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r3 = socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg(r3, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40305839, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x80000001, 0x56, &(0x7f0000000580)=""/86, 0x1e00, 0x2, '\x00', r4, 0xd, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0, 0xaa}, 0x78) gettid() 08:45:45 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x339, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:45 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6f7f4c082fa4e07b07b044d4ce712385cff50a2b13fc83a45d3fab18a6d29952a9cab821981780c20bd5a980ec9847342844a3716c50624a6c2a0bf797be7b24156fe3aff75ae88100bcc8c4cd10461cd2a3d90000bfedcbbf799603a40928a73c6db72415fe4ebe966e56cbc28651411adbba914ac397d95e7cb8e258ccc25695f6692e9bb664d428ce8aa2a5b1c9c76538a8a661ac42532473e7f5f76b603499071caaa8911ba6b54a2a456fc6d00e3af28ff0cdbf682e18d002626f74c39e0754ae931c9f7bfb61ef5388ba32d009f33423cd"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) r6 = openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000002a80)={0x0, 0x80, 0xfa, 0x3, 0x7, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x0, 0x80, 0x101, 0x2, 0x0, 0x3, 0x6, 0x8, 0x0, @perf_config_ext={0x1, 0x2}}, 0x0, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x6, 0xff, 0x80, 0x0, 0x8, 0x101408, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f00000002c0), 0x3}, 0x100, 0x2, 0xd4c, 0x1, 0x8e, 0x1ff, 0x3, 0x0, 0x0, 0x0, 0x523}, 0x0, 0x9, r6, 0x9) gettid() 08:45:45 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0x5, 0x3, 0xc1, 0x6, 0x0, 0x2, 0x50832, 0xd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x0, 0x7}, 0x8, 0x0, 0xe0cc, 0x6, 0x3, 0x7000, 0xffc1, 0x0, 0x8001, 0x0, 0x2}, r2, 0xffffffffffffffff, r0, 0x63ed3e7bf8e1ff0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) close(0xffffffffffffffff) openat$cgroup_subtree(r3, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x0, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00052182c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1722.942146][ T55] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1723.009905][T26993] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1723.126606][T26993] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 08:45:45 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x33a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1723.295356][T26993] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:45 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() close(r0) 08:45:46 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xe42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:46 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab8219817804904707db683220c128c1f5a317b20e09b8152716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xe, 0x1, 0x2, 0x40, 0x0, 0x9, 0x1000, 0x10, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x50811, 0x10001, 0x80000001, 0x7, 0xfec0, 0x7, 0x8000, 0x0, 0xdfd, 0x0, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0xa) 08:45:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00052282c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:46 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x33b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1724.364666][T27018] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1724.379295][T27018] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1724.412392][T27018] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:47 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x24, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:47 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) r6 = perf_event_open$cgroup(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0x7, 0x55, 0x40, 0x0, 0x0, 0x2021, 0xe, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f0000000340), 0x6}, 0x4401, 0x3, 0x6, 0x7, 0x0, 0xfffff800, 0x100, 0x0, 0x9, 0x0, 0x5}, r3, 0x7, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0x5, 0x7, 0x20, 0x0, 0x9, 0x40, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x1}, 0x800, 0x2, 0x7, 0x1, 0x2, 0x8, 0x6, 0x0, 0x6, 0x0, 0x8}, 0x0, 0x0, r6, 0x8) gettid() 08:45:47 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0xffbb, 0x80, 0x0, 0x0, 0x0, 0x0, 0x80000000003c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x39, 0xffbffffffffffff7}, 0x0, 0x0, 0x0, 0x0, 0xa002, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000002c0), 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) gettid() 08:45:47 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r4 = gettid() perf_event_open(&(0x7f0000002a80)={0x0, 0x70, 0xfa, 0x3, 0x7, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x0, 0x80, 0x101, 0x2, 0x0, 0x3, 0x6, 0x8}, r4, 0xf, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40305839, &(0x7f0000000000)) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x5, 0xf9, 0x54, 0x7f, 0x0, 0x400, 0x30, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x800, 0x0, @perf_config_ext={0x3, 0x5}, 0x40008, 0x80000001, 0xa0000000, 0x3, 0x3, 0x5, 0xff, 0x0, 0xffffffc1, 0x0, 0x101}, r4, 0xf, r5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:47 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x33c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00052382c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1724.971448][T27054] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1725.062774][T27054] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1725.202144][T27054] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:47 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r0, 0x0, 0xd71e6965e10af8e9, &(0x7f00000008c0)='\x87!\x12\xe5\xcc3 \x88E\x97\x14\x0e.\xca\xe5\xf7\x95\x84\xcb5I\x04\x18cL\xc5\xe3\xc9\x1c(\xb9\xf7r\xf8\x83\x9b\x977\xee\x11\x92]l\xc2\xfd\xee\xfdsq\x86\x92\xb9\xc9\x96\xc1s\fr\x0fT\x7f\x1c\xc8\x0f\xb7G7\xf8l\xdfU\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x83=~V\xf03\xd8\xd8\x1d\xbdm\xb1^fZ.y\x14nA\xa9\xf4!F)\n\xc1\xb4\x1e\xe9,v/\xaaa\x11#\x19\\\xb8oz\x92\x95\xdd\xe6SMy[8x\x17\x1e8m^\xc4\xbe\xb7\x81\xac\xd7l\xc4\xa3\x9bvG\xde\x15\xf98\xd9:\x99id\xe7Z&\x1e$\xa0}}YV\x9f|\xe3>+35St\xc5HS\x95(a\x87}\x05\x03i\x8d\x94\f\xfb\xbdAb\xde\x8aX*c\xe7\xbe\x81AK\x89\n\xab\x01h\xb0\xa1\x90\x1by\x8d0Vd3\xcb\xb0\f\x11\xbau\xfag\xd3\x1e\xea\xab\xb8\x8f\xff\xed\xebM\xd4hP\x83\xca6\\\xdf\t~\x81\x122\xe5\x13\xb5W\x05\xc2f Ui\xe1\xc4\x8b\xe9n\xc8\x13\xd0M\xdfU(\xad\xd9\xc9v\xc89\xd2\xc8vU\xb6\xc7M\xcc\x8dS\xb9\xe4Ke\x95\x10Y\xcaZw\xc5\x9f\x84\x0e\xa4\xd1?o\xac\xfbn(\xef\xb3\x1fmo\x01\xddP\xdb\xce\xc0\xdbT3K\"\xb6J\xea(\xe8XBWL<)\xd1,\x88P\xfd_\xd0\xe8a4\x98e\x04\xb3\xf9\xb0|\\\xd4\xb2\xf0n\'=>z\xa6\xf7\xce\x83\xa2\x05}7\xaf\xea\x16\xbc\x1e\xb2\x87\x8c\xb9%\x90\xbc\xc9?\x1c\nR\xf5C\xbd\t\x05\xca`\x95\xa5\xa8\\\xc6\x18\\\xd1.+O\a\x0f\x02\xdfX\x85\x89\xd6\xc8M\xe0\x87\x8b\x85h\xd4+\x9b\xa4\xb6\xb2\xbcp\"\x8b:\xc5\xec\xc8*\x06\xd0\x99Z\xb9\xce\xd8\rYo\x91\xfbH(\x94\xb2\x94\xfc{\x18\x00\xb4\xbe\x92\x8b\xa1\x8bzK1\xd6_\xc7\x99\x8f\x16Y(\x038\xd0^;;=\xf2\xda\x13\x9f\x00\x00\x00\x00\x00\x00\x00TQQ\xd1~\x1e\x0e\xbb\xb5\x96\x9f\xa4\x95X\xfbw\xef\x85\xb8\xb2\x10\x93=o\xb77\x041\xc7\xa3q\xf4\xcc\x036\x8c)\x96HM\xc6Dv\xeck93H\xa7V\xea\xe5G@\xcb\xbd\xc2\xbb\x92\xf6\x1f\x12pkC\xf8\xb5\x96\xe6\xb4~\x99\xc0T\xc3O\xd0\x97\xb4\x8fg\x86\f!\no\x02\xd6\v\xb8%\xdb=[\xabft\xb5\xe9V\xd3:\x84\a\xc8\xb11\xa4\xcde\xa1\xc6k\xcc\xdf\xcf\x83\x01x'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) openat$cgroup_ro(r4, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06bfb4acc31e1d95dae6fcfa47a57257f4c0844b2000000000000000013fc83416aa45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75a567dc178c8c4cd10461cd2a3d90021bfedcfbf619403000928a73c6db7"], &(0x7f0000000280)='GPL\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x2, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) gettid() 08:45:47 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="299c00080d0000006ba56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc810461cd2a3d900d4688a52ca83234d"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:47 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x33d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:47 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000002c0)=0xfff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, &(0x7f00000005c0)=0x40000002b) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='pids.current\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00052482c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:48 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00', 0x0}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r0}, 0x4) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() [ 1726.403455][T27087] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:49 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x25, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:49 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x33e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:49 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x3, 0x80, 0xf9, 0x1, 0x1, 0x7, 0x0, 0x0, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000002c0), 0x4}, 0x2000, 0x3, 0x100, 0x3, 0x9, 0x9, 0xfb5e, 0x0, 0x7ff, 0x0, 0x3dd0}, 0xffffffffffffffff, 0xc, r2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946016b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:49 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x248, &(0x7f0000000740)='cg\x13\xa5\t\xdb\x00\xee\xb1\xd5\xb5\xe3\xfc\vn\\\x97I\xd5l\x9e\xeea\xf0|\xe8\xf8\x89\xf8\x96\\\xe3%\xf6-\x17g\xac4\xeb\xa7a\xff\x047\x92\xe514\\\xe5\x97K\x1f\x91tL\"q\xc0/\a\xebf$\x82\x84`\n\xb48i\xbf\xb6+\x1b\n\"&\x9c\x83[\xe7}\xf4\xab=\x92\x93\xec\xe3\xffX\xd7\xdd\xe5\'\xddpc\xc1\x7fW\r\x12A(\xc4\x93\x99\x1cO\xc1 &?\xa30Y\xc8\xc2Xc$\b\xca$\xcf&\xa9CG\xee1\xf3\xd5\xbc\xa6T\x18\xa0s\xab\xda\xe8\x83\xa9u\x00[\fR\xb5\xdc\f\xf2Jj/\x16\x90\x90\xb7\x92\x84\xc1\xc1\xef\n2\xa0\xa2\x1d\xa0P\xf5\a\x981\xa6\xd4c\x8a\xc0Yw\xe9\xd0\xfc\xe3A\xec\xba\x13\x8c\x14Q\x88\xe7\x94\x98\xac\x10{\x01o\xe8\x03\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf1\xb1\x7f\xb27z@}\vE\x9eWz?S\x17\x9e\xe0{\x1c\xa76{\xd2L\xc8QA\x80\xc7\xfaL\x17%\x92J\x9e)\xeb\xbd;\x05\xb3\x92\xa1\x17ITD\xd5\a\x06\xda\x00\x19oK\xc4J\xca0b\xafHHKw\xfc\xbf\xa1|\n\x00\x1f\xac\x92\xdf\xe8n\xd7\xdaIj~\xe7[\xf1\xf0\xdc\xa5={V\x17\xe7\x94\f1\x99b\xca\xb7\x18{{B\xfb)yd\x12q\xaau\xec\xac?\x15\t\xbe5ek&\n\x93\xd7\x8e\v\x02\xfa-\xc5\x94g\xcb\xef\xa8\x82f\x05jL\x16\x80\x00\xa3\xd0R\xd3J\'\xaa\xd5\x92\xfd\xd7\f\x8fJ\xb7\x80s\xa7\xa2\x8d\xc2M\xaeYe\xa4*\xd8\xc4\x17\xb9\xb2K\v\xadD\xaaRIK\xe8\x89\b~A@\xe8\x16\xf4&\xe6\t`2n_m\x86v\x18\xa8\xf5\xc4(\xc8\v\xcb\rn\x1e\a`-)\xb3\x96\xb6\xbe\xc4\xdb\xf3?\xc4\x0563\x82\x03\x11\x9dO\x82\xd7\xe4r\x93\xfa\x02\xab\xb1\x85\n\xce\xdd\xf2\xea\xe1o\x87Yt\x83\n\x8dW\xe1,{4\xaeY\xac\xa7*\x06\x96\x1f\xc7\xf4\'\x11\xe8\x86\xaal_\xfc\x89c\xff\x87\xac\x9b6\xe5\xf5\x99\x9cl\"\t:\xf4K\xe1\xe5\x9f\xba\xea\xed$\xdc\xec\xcdr[\xc0\x94\xbb\x8f\x0eu\x8b\x9b\xa2\xbc\xb20E\xa4\x10\xa3Ub\x01\xed\xcft\xf2\x88\xc6\xe5\x03\x00\xd3\x9b\xf1\xd4\xa5\xc8\r\x9f\x1b\xc7K\x9c[gyn\xd9+\x94oy\xe7'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f00000025c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000340)={r3}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x10, 0x5, &(0x7f00000002c0)=@raw=[@call={0x85, 0x0, 0x0, 0x74}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x42b4}, @generic={0x8, 0x1, 0x8, 0x2, 0x4}, @alu={0x7, 0x0, 0x9, 0x8, 0x3, 0xffffffffffffff40, 0x1}], &(0x7f0000000300)='GPL\x00', 0x3, 0xcc, &(0x7f00000003c0)=""/204, 0x41100, 0x10, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f00000004c0)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0x0, 0x40, 0x3}, 0x10}, 0x78) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1c, 0x0, 0x0, &(0x7f0000000540)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:49 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="299c00080d7cc3bc2c2de94e937028bbac257c2150000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00052582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1727.116468][T27120] validate_nla: 2 callbacks suppressed [ 1727.116492][T27120] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1727.217693][T27120] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1727.306369][T27120] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:50 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x33f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:50 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x6611, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x1, 0xeb, 0x5, 0xff, 0x0, 0x80000000, 0x20028, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8, 0x7fffffff}, 0x8, 0x7, 0x7, 0x2, 0x1f, 0x4, 0x3, 0x0, 0x7fff, 0x0, 0x7ff}, r2, 0xe, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00052682c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:50 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@cgroup, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50623a6c2a0bf797be7b24156fe3aff75ae8b27ebcfcc4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:50 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) recvmsg(r1, &(0x7f0000001380)={&(0x7f0000000e00)=@can={0x1d, 0x0}, 0x80, &(0x7f00000012c0)=[{&(0x7f0000000e80)=""/113, 0x71}, {&(0x7f0000000f00)=""/212, 0xd4}, {&(0x7f0000001000)}, {&(0x7f0000001040)=""/203, 0xcb}, {&(0x7f0000001140)=""/40, 0x28}, {&(0x7f0000001180)=""/45, 0x2d}, {&(0x7f00000011c0)=""/224, 0xe0}], 0x7, &(0x7f0000001340)=""/10, 0xa}, 0x12001) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001640)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=0x81, 0x0, 0x0, 0x0, &(0x7f0000001480)={0x5, 0x5}, 0x0, 0x0, &(0x7f00000014c0)={0x2, 0x2, 0x3, 0x5}, &(0x7f0000001500)=0x8d46, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)=0x5}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001680)={0x1a, 0xc, &(0x7f0000000300)=@raw=[@map_val={0x18, 0xe9f2e4951973dc35, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x839f}, @ldst={0x0, 0x3, 0x0, 0x9, 0x6, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0x0, 0x0, 0x3, 0xb, 0x40, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}, @ldst={0x2, 0x1, 0x1, 0x0, 0x9, 0x100, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f00000003c0)='GPL\x00', 0x101, 0x1a, &(0x7f0000000400)=""/26, 0x40f00, 0x9, '\x00', r6, 0xb, r3, 0x8, &(0x7f00000013c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000001400)={0x3, 0x4, 0x8, 0x4}, 0x10, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:50 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000540), 0x2bf70) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00082d000000af6c1e9cf7532f13732946d06b16c1a031e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf70600000000000000f75ae8b27ebcc8c4cd10461cd2a3d90000000000"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) r5 = gettid() perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x3, 0x0, 0x0, 0x81, 0x0, 0x3, 0x400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x48, 0x4, @perf_config_ext={0xa1, 0x400}, 0x10062, 0x0, 0x2, 0x0, 0x80, 0x0, 0x8, 0x0, 0x81, 0x0, 0x9}, r5, 0xe, r3, 0x0) write$cgroup_int(r3, &(0x7f0000000240)=0x1, 0x12) write$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0), 0x9) [ 1728.741051][T27144] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1728.760287][T27144] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1728.806891][T27144] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:52 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x26, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:52 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x340, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:52 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:52 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup(r4, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000300)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r6, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:52 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x6a, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='io.stat\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce7123bffa6ca62b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00052782c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1729.637454][T27192] netlink: 'syz-executor.0': attribute type 16 has an invalid length. 08:45:52 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x341, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1729.843535][T27192] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1729.920339][T27192] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:52 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:52 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x3, 0x6, 0xd1, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x5}, 0x0, 0x0, 0xfffffffc}, 0x0, 0x4, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() [ 1729.990584][ T3231] ieee802154 phy0 wpan0: encryption failed: -22 [ 1729.997268][ T3231] ieee802154 phy1 wpan1: encryption failed: -22 08:45:52 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) close(r5) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000400)=0x80) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab83939a50a21c44443644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000f1507f927a00"/130], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r6, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00052882c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:52 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x342, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1730.703290][T27221] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1730.734015][T27221] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1730.769546][T27221] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:53 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x27, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:53 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x4, 0x2, 0x40, 0x1, 0x0, 0x80, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xeef, 0x9}, 0x4001, 0x52d, 0x2, 0x7, 0x2, 0x8, 0x200, 0x0, 0x20bc, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x8) r4 = gettid() perf_event_open(&(0x7f0000002a80)={0x0, 0x70, 0xfa, 0x3, 0x7, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x0, 0x80, 0x101, 0x2, 0x0, 0x3, 0x6, 0x8}, r4, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7, 0x1, 0x6, 0x1, 0x0, 0x3e, 0x40400, 0xc, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x6, 0x1}, 0x200, 0x5, 0x0, 0x2, 0x8, 0x5, 0x5, 0x0, 0x93be, 0x0, 0x3}, r4, 0x5, r2, 0x3) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x22, 0x4, 0x9, 0x2, 0x0, 0x4, 0x244, 0xa, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffc00, 0x1, @perf_config_ext={0x5, 0x1}, 0x8000, 0x4, 0x3, 0x2, 0xffffffff80000001, 0x2, 0x1, 0x0, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0x9, r3, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:53 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:53 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c360bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db733235b52833ffbfda0cf64ace9456bd4640a6b2f4735d44fd341b76c3c85c86d863263c38c53334051a37eef77801b5d3d5fcfe14e62c35df364bc12dd0a9cf6136268e90cfb650a5318d95fb91e9c852af5aff5577a0f74bba8ab6d436ff7441bec96280517492f72e50a633298c7a7f6c0"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:53 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x343, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00052982c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00052a82c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:54 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x344, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:54 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='pids.current\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x40000002b) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000300)=0x9) r2 = openat$cgroup_ro(r1, &(0x7f00000002c0)='net_prio.prioidx\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:54 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, [@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @ldst={0x2, 0x3, 0x2, 0x5, 0xb, 0x20, 0xffffffffffffffff}, @alu={0x4, 0x1, 0x1, 0x0, 0x5, 0x30}]}, &(0x7f0000000300)='GPL\x00', 0x6, 0x72, &(0x7f00000004c0)=""/114, 0x40f00, 0x3, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000340)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0xa, 0x27e7, 0x5f7}, 0x10}, 0x78) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:54 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0xc1, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.state\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='freezer.state\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:55 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000300)={0x4, 0x80, 0x0, 0xff, 0x3f, 0x66, 0x0, 0x455, 0x400, 0xe, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0xc}, 0x0, 0xb1e, 0x2, 0x7, 0xfff, 0x3ff, 0xfffc, 0x0, 0x9, 0x0, 0x7400000}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() [ 1732.942946][T27278] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1732.964403][T27278] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1732.999139][T27278] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:55 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x28, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:55 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x345, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:55 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x59, &(0x7f0000000400)='cgroup\x00\xee\x82\xc6F\x8bI|\x91]\x18\xa3\xb67>qw\x9e]\x9e=\x94fH^\x89\x83\x06\xd9\xb7\xae\x93\xc7\xa2^\xf0\xa4c\xcc)\x1d9\xc7@k]\xff\x9a\x9d\x01\x18\xb7\xb8iP/G\x91T\x1e\x89\x987\xe9j\xe0\xaa\xde{\xa7\x03\xf7\xdc\xc0\x13k\x00\x00\x00\x00kC\x9d'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000300)='memory.swap.current\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x10, &(0x7f0000000840)=ANY=[@ANYBLOB="180000003104000000000000030000009556050000000000ff20060000000000408000006d00000018300000020000000000000000000000d39b3000fcffffff18110000", @ANYRES32, @ANYBLOB="000000000000000018310000010000010000000000000000851000000700002000100000f81954854f675826da23fbbea28cffffff47b1000184b0125cf250e02dd12897080000009500000000000000"], &(0x7f0000000500)='GPL\x00', 0x4, 0xce, &(0x7f00000006c0)=""/206, 0x41000, 0x8, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000340)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x13, 0x6, 0xfffeffff}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x7, 0x8, 0x73, 0xd7, 0x0, 0x8, 0x10, 0xf, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffc00, 0x0, @perf_bp={&(0x7f0000000280), 0x2}, 0x1004, 0xffffffffffff2948, 0x1f, 0x5, 0x9, 0x61, 0xef, 0x0, 0x9, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x9) close(r4) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) openat$cgroup_ro(r0, 0x0, 0x7a05, 0x1700) gettid() 08:45:55 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) r3 = gettid() perf_event_open(&(0x7f0000002a80)={0x0, 0x70, 0xfa, 0x3, 0x7, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x0, 0x80, 0x101, 0x2, 0x0, 0x3, 0x6, 0x8}, r3, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x69, 0xb5, 0x31, 0x7f, 0x0, 0xe45, 0x48088, 0xd, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x826f, 0x8, 0x1, 0x5, 0x4, 0x7, 0x0, 0x8001, 0x0, 0x3}, r3, 0xd, r2, 0x8) close(r2) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:55 executing program 3: r0 = gettid() perf_event_open(&(0x7f0000002a80)={0x0, 0x70, 0xfa, 0x3, 0x7, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x0, 0x80, 0x101, 0x2, 0x0, 0x3, 0x6, 0x8}, r0, 0xf, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r1, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r2, &(0x7f00000000c0), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r4, &(0x7f00000002c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a49337ba6c764fbc362198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xe, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00052b82c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1733.597872][T27325] netlink: 'syz-executor.0': attribute type 16 has an invalid length. 08:45:56 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x346, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1733.827056][T27325] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1733.948012][T27325] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:56 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) close(r5) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732949061564d8b26246d06b164bcc31e1d95dae6fcfce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c0cd10461cd2a3d90000bfedcbbf79940303f2ec4a9ff0d7686457a4fb298ea88a5996985555a8dad23a6d837959e0d7e113ef962fc35d09fe513ceaca63f1701b10c542660c7872ac852e62f1f77b4211bb93cb63ebc34d654d884993fdaf75458e8a5ad3b6385b34f40cfe22e71933617f562fa9ff507d63d44afe5d2f9b3aeef00823c93aa4bf4aca89b7709edb741960a272ba69b03ee105820427ad46ca70159a6b815d475d025935c0471ad96594bf1a582569cf64f4146b678185f0ea4da6e102b9429944512dd88138f844d8a8a0e466214d749198a5"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r6, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() recvmsg(r5, &(0x7f000001e280)={&(0x7f000001d180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000001d240)=[{&(0x7f000001d200)=""/49, 0x31}], 0x1, &(0x7f000001d280)=""/4096, 0x1000}, 0x2102) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001e340)={0x18, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="5058f6fffbffffff18000000", @ANYRES32=r4, @ANYBLOB="0000000001040000"], &(0x7f0000000300)='GPL\x00', 0x3, 0x3d, &(0x7f0000000340)=""/61, 0x40f00, 0x12, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000001e2c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f000001e300)={0x2, 0x8, 0x7, 0x8}, 0x10}, 0x78) 08:45:56 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='memory.events\x00', 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0x9, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x3, 0x8, &(0x7f00000002c0)=@raw=[@exit, @alu={0x7, 0x0, 0x4, 0x1, 0x2, 0x50, 0xfffffffffffffff4}, @jmp={0x5, 0x1, 0xa, 0x0, 0x4, 0x4, 0x8}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @ldst={0x2, 0x2, 0x6, 0xa, 0x2, 0x50, 0x1}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000300)='GPL\x00', 0x6, 0xc3, &(0x7f00000003c0)=""/195, 0x1e00, 0x2, '\x00', 0x0, 0x8, r1, 0x8, &(0x7f00000004c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0x8, 0x3, 0x5ec}, 0x10, r2}, 0x78) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:56 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, &(0x7f0000000000)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x4e, 0x2, 0x2, 0x0, 0x0, 0x8, 0x10000, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext={0x10001, 0x7}, 0x8040, 0x2, 0x8, 0x5, 0xfff, 0x5, 0xffff, 0x0, 0x2, 0x0, 0xd59}, r3, 0x6, r4, 0x1) close(r2) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00052c82c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:56 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x347, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1735.074800][T27354] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1735.092033][T27354] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1735.148614][T27354] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:58 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x29, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:45:58 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x559}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="149c00080d5cb300a56c16bef7532f13736c52d06b164bcc31e1d95dae6fcfa47a5725a0c96fa0b2ce712385cff50a2b13fc83bbdffca45db1d29952a9cab82198178049128c1f644a473cbf2829a3ea0c000000000000f797be7b24156fe3aff75ae8b27ebcd8c4cd10461cd2a3d90000bfedcbbf799403a40928a7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:45:58 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = gettid() perf_event_open(&(0x7f0000002a80)={0x0, 0x70, 0xfa, 0x3, 0x7, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x0, 0x80, 0x101, 0x2, 0x0, 0x3, 0x6, 0x8}, r4, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0xff, 0xf3, 0x8, 0x7c, 0x0, 0xffffffff7fffffff, 0x5440, 0xc, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2d, 0x1, @perf_config_ext={0x4, 0x3}, 0x2, 0x9, 0x3, 0x2, 0x6feb, 0x200, 0x7f, 0x0, 0xfff, 0x0, 0xfffffffffffffffb}, r4, 0x1, r3, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:58 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f00000001c0)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="51299c00080d000000a56c16bef7532f13732946d06b164bcc31e10844bfce712385cfe90a2b13fc83a43dc339a5a6051f782198178049128c1f644a47ee69800a743cbf2829a3716c50624a8c2a0bf797be7b24156fe8b27ebcc8c4cd100000005d59000000000000"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:58 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x348, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00052d82c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1735.786466][T27388] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1735.879524][T27388] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1736.027716][T27388] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:45:58 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x349, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:45:58 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a29}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x6, &(0x7f0000000440)=ANY=[@ANYBLOB="180000008100000000000000ffff2d90c051a57a0c90f14170ba9e3aff010000000000000000183a00000300000000000000000000009500000000000000"], &(0x7f0000000400)='GPL\x00', 0xfffffff7, 0x99, &(0x7f00000004c0)=""/153, 0x41000, 0x7, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000700)={0x2, 0xe, 0x1ff, 0x4}, 0x10}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x20, 0x3, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x463, 0x5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000007c0), 0x2}, 0x292, 0x1, 0x5, 0x9, 0x7, 0xfffffffe, 0x0, 0x0, 0x80, 0x0, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000800)=ANY=[@ANYRESDEC], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x61, &(0x7f00000008c0)=""/97, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000007, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x2, 0x0, 0xb}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='pids.events\x00', 0x0, 0x0) gettid() 08:45:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00052e82c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:58 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x88}, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000001c0)={[{0x2b, 'pids'}, {0x2b, 'cpu'}, {0x2d, 'cpu'}, {0x2b, 'rdma'}, {0x2d, 'cpu'}, {0x2b, 'pids'}, {0x2d, 'memory'}]}, 0x29) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:59 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f00000002c0)='tasks\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:45:59 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x34a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1737.173141][T27456] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1737.275084][T27412] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1737.291280][T27412] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1737.324984][T27412] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1737.381330][T27412] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:00 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x2a, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:00 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000240)=0x400) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:00 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x34b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:00 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x93, 0x31, 0x9, 0xe, 0x0, 0x80, 0x40000, 0xe, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9722, 0x0, @perf_config_ext={0x8001, 0x80}, 0x2020, 0x7f, 0x0, 0x1, 0xffff, 0x1, 0x6, 0x0, 0x4b2085c5, 0x0, 0x1000}, 0x0, 0x10, 0xffffffffffffffff, 0x1) close(r5) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x5) openat$cgroup_ro(r6, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:46:00 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, r0, 0x0, 0x102, &(0x7f00000003c0)='cgroup\x008\x9e\x91p\x97\xa1_$\x94\xd2\xd1\xa2`\a\xbd\xca\x16=\xfe\x164a\xa7\xcbD\xfa\x03!\xf5\x80\x85D\x04K#\xa0\x11,B\x1f\xcf\xd3\x95#A`S\xbc\xa3\x11\x1f\x9d\xe8Z\x91?\xa6\xe2\x93\xd5\xcc\x13\x0e\xd4\xf7K\xf8\f\xc6\xa7M\xca\x12\xdf\x85\xbb\xeb\x06$/]\xb6DA\x8a\xb8\xc6\x1dt\xd1c\xbbP\x1cs\xae\x03\x00\x18\xd5\x9f\xc0-#\xf9\x8a\x8dX\x9f\xd6\x83$\xcd,\xdc\x81\xb3\xc4A\x91o\v\xf2\x80>\vB\x90X\xb5_\x01.p\xb5\xd7w\xea\xc9J\x16\x86\xb6\x80\x97\x89\xe8\xc0\xce\xba\b\xfe\x97\x949,\xf3\x00\x00a\xac\xaa\xear\xe4@\xf9hw^\xe0\xc7H\x1ad!\xad\x8e\b\xceP\rzG\xab\xb4\xcef7^\x9f [|\xd2\xe2$\x17\xb1\x97\xb4d;\xabCd\xd7\xb6\xe23M|=\xb2\xaf\xd5L\xe42t\x7f\x9e\xe9:\xb9\x1a\xab\xa9\xacZ\x93\xab\x0f*7\xe1G\x06\x87\xb4\xce\x13\xd5\x06\xbe\xcd&\xab\xd2UI'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x6, 0x8c, 0x1f, 0x0, 0x10001, 0x8000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000002c0), 0xa}, 0x8000, 0x42a5, 0x7, 0x1, 0x6ab, 0xff, 0x5, 0x0, 0x20, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x2) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00052f82c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1738.065044][T27452] validate_nla: 2 callbacks suppressed [ 1738.065068][T27452] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1738.190122][T27452] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 08:46:00 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x34c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1738.287008][T27452] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:01 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r0, 0x0, 0x17, &(0x7f00000001c0)='cgroup.subtree_control\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053082c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:01 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:46:01 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x34d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:01 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() [ 1739.498995][T27483] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1739.532285][T27483] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1739.586358][T27483] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1739.683472][T27483] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1739.714412][T27483] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1739.746245][T27483] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:02 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x2b, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:02 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000540), 0x2bf70) openat$cgroup_ro(r2, &(0x7f00000001c0)='cpuacct.usage_user\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:02 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x34e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:02 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) close(r5) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r6, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() recvmsg(r5, &(0x7f000001e280)={&(0x7f000001d180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000001d240)=[{&(0x7f000001d200)=""/49, 0x31}], 0x1, &(0x7f000001d280)=""/4096, 0x1000}, 0x2102) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001e340)={0x18, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="5058f6fffbffffff18000000", @ANYRES32=r4, @ANYBLOB="0000000001040000"], &(0x7f0000000300)='GPL\x00', 0x3, 0x3d, &(0x7f0000000340)=""/61, 0x40f00, 0x12, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000001e2c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f000001e300)={0x2, 0x8, 0x7, 0x8}, 0x10}, 0x78) 08:46:02 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000300)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000540), 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000340), 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x1}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053182c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1740.334327][T27522] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1740.403492][T27522] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1740.537895][T27522] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:03 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532ff6722946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f654a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) openat$cgroup_ro(r2, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r5 = socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg(r5, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f00000025c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x8, 0x5, 0x1, 0x9, 0x100, 0xffffffffffffffff, 0xe49fb53f, '\x00', r6, 0xffffffffffffffff, 0x1, 0x4, 0x3}, 0x40) gettid() 08:46:03 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x34f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053282c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:03 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) close(r5) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732949061564d8b26246d06b164bcc31e1d95dae6fcfce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c0cd10461cd2a3d90000bfedcbbf79940303f2ec4a9ff0d7686457a4fb298ea88a5996985555a8dad23a6d837959e0d7e113ef962fc35d09fe513ceaca63f1701b10c542660c7872ac852e62f1f77b4211bb93cb63ebc34d654d884993fdaf75458e8a5ad3b6385b34f40cfe22e71933617f562fa9ff507d63d44afe5d2f9b3aeef00823c93aa4bf4aca89b7709edb741960a272ba69b03ee105820427ad46ca70159a6b815d475d025935c0471ad96594bf1a582569cf64f4146b678185f0ea4da6e102b9429944512dd88138f844d8a8a0e466214d749198a5"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) openat$cgroup_ro(r6, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() recvmsg(r5, &(0x7f000001e280)={&(0x7f000001d180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000001d240)=[{&(0x7f000001d200)=""/49, 0x31}], 0x1, &(0x7f000001d280)=""/4096, 0x1000}, 0x2102) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001e340)={0x18, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="5058f6fffbffffff18000000", @ANYRES32=r4, @ANYBLOB="0000000001040000"], &(0x7f0000000300)='GPL\x00', 0x3, 0x3d, &(0x7f0000000340)=""/61, 0x40f00, 0x12, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000001e2c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f000001e300)={0x2, 0x8, 0x7, 0x8}, 0x10}, 0x78) 08:46:03 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x80, 0xd9, 0x2, 0x7, 0x0, 0x40, 0xa808, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_bp={&(0x7f00000002c0), 0x4}, 0x2000, 0xfffffffffffffff9, 0x3, 0x0, 0xc6f, 0x4, 0x200, 0x0, 0x3, 0x0, 0x3a4}, 0x0, 0xb, r3, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:04 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x350, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1741.914969][T27544] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1741.937230][T27544] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1741.972775][T27544] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:05 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x2c, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:05 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='pids.current\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x40000002b) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000300)=0x9) r2 = openat$cgroup_ro(r1, &(0x7f00000002c0)='net_prio.prioidx\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:05 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() openat$cgroup_ro(r1, &(0x7f00000001c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) 08:46:05 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x351, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:05 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000002c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053382c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1742.636678][T27591] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:05 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x352, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053482c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:05 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='pids.current\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x40000002b) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000300)=0x9) r2 = openat$cgroup_ro(r1, &(0x7f00000002c0)='net_prio.prioidx\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:05 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x4c, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000037000509d24380648c63940d0400fc60067a12400c00020003003f0037153e370a0001805a256400d1bd", 0x2e}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r2, &(0x7f00000000c0), 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'io'}, {0x2d, 'cpu'}, {0x2b, 'pids'}, {0x2d, 'cpu'}, {0x2b, 'pids'}]}, 0x1a) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r0], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() [ 1743.291352][T27611] validate_nla: 2 callbacks suppressed [ 1743.291704][T27611] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1743.476130][T27615] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 1743.504623][T27611] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 08:46:06 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x353, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1743.640224][T27611] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:06 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000240)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000240), 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:07 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x2d, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:07 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x1e, &(0x7f00000002c0)='cgsb\x13q\xed\x8d\xbf#)\x98\x8d\xcaz\xf9*\x100,\x93\x81))\xcd\xab\x17\xeb\xdc\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00054782c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:07 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000bfedcbbf799403a40928a73c6db7"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10}, 0x78) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000540), 0x2bf70) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)={[{0x2d, 'rdma'}, {0x2d, 'rdma'}, {0x2b, 'io'}, {0x2b, 'memory'}, {0x2b, 'pids'}]}, 0x1e) openat$cgroup_ro(r5, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:46:07 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x354, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:07 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef72946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d90000000000"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() [ 1745.069158][T27657] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1745.143425][T27657] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 08:46:07 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x355, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1745.236212][T27657] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:08 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) close(r2) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:08 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r3}, 0x8) close(r5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x12, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x60, &(0x7f00000003c0)=""/96, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00055a82c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:08 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x356, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:08 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000003c0), 0x10) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0x4, 0x40, 0x5, 0x0, 0xfffffffffffff801, 0x0, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000002c0), 0x2}, 0x20, 0x2, 0x1ff, 0x4, 0x70, 0x2, 0x6, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r4, 0x8) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() [ 1746.753151][T27687] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1746.784801][T27687] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1746.821309][T27687] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:09 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x2e, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:09 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x40000002b) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0xff, 0x20, 0x3, 0x7, 0x0, 0x972, 0x10000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x58be, 0x0, @perf_config_ext={0x6, 0x3}, 0x40812, 0x8000, 0x9b, 0x7, 0x77, 0x10001, 0x3, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f00000002c0)={0x3, 0x80, 0x2, 0x8, 0x4, 0x9, 0x0, 0x3, 0x802, 0x6, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x6, 0x68c59607}, 0xc06, 0x0, 0x7fff, 0x5, 0xfffffffffffffffb, 0x5, 0x36, 0x0, 0x8, 0x0, 0x7f}, 0xffffffffffffffff, 0x1, r1, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r2, &(0x7f00000000c0), 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) close(r5) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x7c850751) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299cbef7532f13732946d06b164bcc31e1d944b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27e3cc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:09 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x357, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:09 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() r5 = gettid() perf_event_open(&(0x7f0000002a80)={0x0, 0x70, 0xfa, 0x3, 0x7, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x0, 0x80, 0x101, 0x2, 0x0, 0x3, 0x6, 0x8}, r5, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x20, 0x8, 0x1, 0xff, 0x0, 0x100, 0x80110, 0x7, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f00000002c0)}, 0x0, 0x4, 0x0, 0x5, 0xfffffffffffffff7, 0x1000, 0x3ff, 0x0, 0x401, 0x0, 0xfffffffffffffbff}, r5, 0x7, r4, 0x0) 08:46:09 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r3}, 0x8) close(r5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x12, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x60, &(0x7f00000003c0)=""/96, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00055b82c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1747.536820][T27727] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1747.686498][T27727] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1747.794033][T27727] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:10 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x358, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00056c82c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:10 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000002c0)='syzkaller\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() r5 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r5, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)='\x00'}, 0x30) 08:46:10 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x1e, &(0x7f00000002c0)='cgsb\x13q\xed\x8d\xbf#)\x98\x8d\xcaz\xf9*\x100,\x93\x81))\xcd\xab\x17\xeb\xdc\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:10 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x359, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:11 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) openat$cgroup_subtree(r0, &(0x7f00000001c0), 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x40000002b) perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x40, 0x5e, 0x7, 0x0, 0xc7, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x5, 0x4}, 0x104, 0x6f7, 0x1, 0x8, 0xa9, 0x0, 0x2, 0x0, 0x7fff, 0x0, 0x4}, r4, 0x7, 0xffffffffffffffff, 0x9) gettid() [ 1749.435392][T27753] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1749.455208][T27753] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1749.490673][T27753] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:12 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x2f, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:12 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f00000001c0)='cpuacct.usage_all\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) r4 = perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x2, 0x7, 0xc0, 0x1, 0x0, 0x7, 0x1008, 0x7, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x8, 0x8}, 0x40000, 0x8, 0x7fff, 0x8, 0x6, 0x80, 0x4ac, 0x0, 0x200, 0x0, 0x2bd3}, 0xffffffffffffffff, 0x9, r0, 0xb) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000180)) close(r3) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900158424afa6a6673aad28472e76dba7704a94b0a9c601b601384d2a678b70eddb9db5322b7369c484d050ac9bdfc4b991eb28b533a198f440e179b7c15ce5b4bc6cb9abf445c4871cd3bb50c0fdec7c08e4b9d910f08f82de1eed0a76117df66037d615960877ea4319ccb8c2a8d27abecffdb2f615935d955a2a3c8eab6b"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:12 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x35a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:12 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={&(0x7f00000002c0)="0bdaf278c5fd93e6f35738ceea201939fc663f857b11619ef6255fee584686f77185ae28b75a97852acf16191392c1bee1b6beb04d54bca90e01f1981128e690980cc99da05e69e58b45a7ec011d997ef214483fb62f0285fa9ae413db40034da6f3f823707457dc2b02728df5", &(0x7f00000006c0)=""/4096, &(0x7f0000000340)="deaede1016e3b20ef0aa9b4edb6bb67ddd2ca8411428df4749", &(0x7f00000003c0)="b4d8194799433487cecf4a3558d7a56fda3c0c42b1e157485d782a2ba7b9099648fe4239e5a245bf70ad7fa0db9d3d6373d56db07b7df3b5719131b71198166845a3324daff3ff8ec183d112b89a9d0d41bfbb1e2f7884926d179efbe3d8a6e60809ba0c6443507aa98125d94a0963cdcb4c6c85b0ed684a1ad8922a3122fc9c9af6e4c5b18e016c9c4f9743bc007df720186991df962097baf81592761457c70b7dfac4710ec417ce799fca0f847822abb22c3d292b1b986603ad9e4c5f5de970", 0x4, 0x1}, 0x38) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(r2, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) openat$cgroup_ro(r0, &(0x7f0000000540)='cpuset.memory_pressure\x00', 0x0, 0x0) gettid() openat$cgroup_ro(r1, &(0x7f0000000500)='net_prio.prioidx\x00', 0x0, 0x0) 08:46:12 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) openat$cgroup_subtree(r0, &(0x7f00000001c0), 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x40000002b) perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x40, 0x5e, 0x7, 0x0, 0xc7, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x5, 0x4}, 0x104, 0x6f7, 0x1, 0x8, 0xa9, 0x0, 0x2, 0x0, 0x7fff, 0x0, 0x4}, r4, 0x7, 0xffffffffffffffff, 0x9) gettid() 08:46:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c10a153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1750.163897][T27794] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1750.207641][T27794] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1750.288354][T27794] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:12 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000001c0)=0xd85f) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:13 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x35b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:13 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001940)={0x0, r0, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) close(r5) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, &(0x7f00000005c0)=0x40000002b) recvmsg(r4, &(0x7f0000001840)={&(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000001780)=[{&(0x7f0000000480)=""/199, 0xc7}, {&(0x7f00000006c0)=""/150, 0x96}, {&(0x7f0000000600)=""/22, 0x16}, {&(0x7f0000000780)=""/4096, 0x1000}], 0x4, &(0x7f00000017c0)=""/80, 0x50}, 0x2000) sendmsg$inet(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f00000002c0)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="f1ecf171d422392b15538b445a3ee7e827cbb96a9a9fb897f4854a1c08b1923de0ca9da78d1c33bf493000bcc645a1063e3e2ec9ebc11b5c54b9d96bc9029634c9e1f343c66456a8b2bfdf4595bd98ded1c301fb0ef187e3dbb220a53a", 0x5d}], 0x1, &(0x7f0000001880)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @rand_addr=0x64010101}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}], 0x38}, 0x40080) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c15a153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:13 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) openat$cgroup_ro(r4, &(0x7f0000000340)='cpuacct.usage_all\x00', 0x0, 0x0) close(r4) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r6 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r6}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:13 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x35c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1751.583961][T27820] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1751.594582][T27820] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1751.651047][T27820] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1751.983475][T27820] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1751.994700][T27820] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1752.021076][T27820] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:14 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x30, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:14 executing program 1: perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000400)={@cgroup, 0xffffffffffffffff, 0x8}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xff, 0xea, 0x1, 0x3, 0x0, 0x2, 0x1, 0xb, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xffff, 0x3}, 0x0, 0x2, 0x5, 0x8, 0x7f, 0xffffff00, 0x50, 0x0, 0xe34, 0x0, 0x9}, 0xffffffffffffffff, 0xa, r1, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000340)=0x8000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:14 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:14 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cf750a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) gettid() 08:46:14 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) openat$cgroup_ro(r4, &(0x7f0000000340)='cpuacct.usage_all\x00', 0x0, 0x0) close(r4) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r6 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r6}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c15b153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1752.422841][T27867] netlink: 'syz-executor.0': attribute type 16 has an invalid length. 08:46:15 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x35e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1752.540941][T27867] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 08:46:15 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cgroup.stat\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f00000002c0)=""/86, 0x41000, 0x11, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000006, 0x4}, 0x8, 0x10, 0x0}, 0x78) openat$cgroup_ro(r2, &(0x7f0000000240)='pids.current\x00', 0x0, 0x0) gettid() 08:46:15 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_ro(r3, &(0x7f00000002c0)='net_prio.prioidx\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() [ 1752.598300][T27867] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:15 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) openat$cgroup_ro(r4, &(0x7f0000000340)='cpuacct.usage_all\x00', 0x0, 0x0) close(r4) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r6 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r6}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c16c153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:15 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x35f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137353e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:16 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) 08:46:16 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xa, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000300)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={@cgroup, 0xffffffffffffffff, 0x1c, 0x1}, 0x14) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:16 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x360, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:16 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x31, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:16 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) [ 1754.411178][T27925] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:17 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x361, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:17 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup(r3, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000340)='cpuset.effective_cpus\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) close(r5) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r5}, 0x8) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:17 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup(r0, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000240)='pids.current\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c1375a3e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1754.940349][T29354] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 08:46:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c1375b3e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:17 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x19, 0xb, &(0x7f0000000400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6590, 0x0, 0x0, 0x0, 0x9}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @map_val={0x18, 0x9, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @generic={0x4, 0x2, 0x3, 0xfff, 0x53}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}, @alu={0x7, 0x0, 0x7, 0x8, 0x6, 0x3bad3acf06785775, 0xffffffffffffffff}, @alu={0x4, 0x1, 0x4, 0x6, 0x6, 0x80, 0x8}]}, &(0x7f0000000340)='syzkaller\x00', 0x400, 0xcd, &(0x7f0000000480)=""/205, 0x41000, 0xe, '\x00', r0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x1, 0xa, 0x3, 0x5}, 0x10}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x9a7a605e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) openat$cgroup_int(r1, &(0x7f0000000240)='io.weight\x00', 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.current\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x1, 0x80, 0x6, 0x1, 0x80, 0x6, 0x0, 0x80000000, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_config_ext={0xa40, 0x5}, 0x9b34b66950424012, 0x20, 0x1000, 0x2, 0x9b38, 0x6, 0x5, 0x0, 0xffffffff, 0x0, 0x3}, r5, 0x0, r4, 0x4) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000003c0)=ANY=[@ANYRESOCT=r2], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x21fc, 0x10, 0x0}, 0x78) gettid() 08:46:17 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x362, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:17 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = getpid() perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x40, 0x16, 0x8, 0x1f, 0x0, 0x8, 0x2808, 0x6, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000002c0), 0x2}, 0x4300, 0x3, 0xd6, 0x1, 0x1, 0xffff8000, 0x5, 0x0, 0x200, 0x0, 0x1}, r4, 0x7, r3, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:18 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x363, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1755.814288][T27958] validate_nla: 2 callbacks suppressed [ 1755.814311][T27958] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1755.894062][T27958] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1755.918728][T27958] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:19 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x32, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:19 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={@cgroup=r1, 0xffffffffffffffff, 0x1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) close(r4) close(r5) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:19 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0), 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbfbe7b24156fe3aff75ae8b27ebcc8c4cd10e977c8000000000000000000"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:19 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, r0, 0x1b, 0x4}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) close(r5) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r4, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x5, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x6, 0x4}, 0x0, 0x0, &(0x7f0000000340)={0x3, 0x2, 0x5, 0x4}, &(0x7f0000000400)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x200}}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000006c0)=ANY=[@ANYRES64=r8], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x0, 0x9}, 0x10, r7}, 0x78) openat$cgroup_ro(r6, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) gettid() 08:46:19 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x364, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c1376c3e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1757.348823][T28008] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1757.455080][T28008] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1757.529553][T28008] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:20 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:20 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x365, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:20 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) r4 = openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000400)='\x00') 08:46:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137155a370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:20 executing program 3: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x4, 0x0, 0x2}, [@jmp={0x5, 0x0, 0x9}]}, &(0x7f0000000480)='syzkaller\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socket$kcm(0x29, 0x7, 0x0) 08:46:20 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x366, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:21 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x34, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1011}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') r1 = getpid() perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x7, 0x20, 0x8, 0x4, 0x0, 0x0, 0x40000, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x480c0, 0x5, 0x8, 0x4, 0x0, 0x7fffffff, 0x3}, r1, 0x7, 0xffffffffffffffff, 0x8) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xd) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x9, 0x9, 0x0, 0x0, 0x0, 0x0, 0x34500, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffe}, 0x0, 0x102, 0xffffffffffffffff, 0x9) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) 08:46:21 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0xf, &(0x7f00000001c0)='cgr\xaa\xc6{N\x933QKoup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc5153d735ae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() r6 = openat$cgroup(r3, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f00000002c0)='cgroup.controllers\x00', 0x0, 0x0) 08:46:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137155b370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:21 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x367, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:21 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0xe}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() [ 1759.183308][T28076] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1759.240862][T28076] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1759.286881][T28076] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:21 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x1600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10d00, 0x0, 0xfffffff9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x2, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:21 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x368, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:21 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)='c\x06>m\xc3\xf0V'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x40000002b) openat$cgroup_ro(r1, &(0x7f00000001c0)='devices.list\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532fcc31e1dd5dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3d900"/109], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137156c370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:22 executing program 3: r0 = socket$kcm(0xf, 0x3, 0x2) sendmsg$sock(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000000c0)="c49613604a8ff2", 0x200000c7}, {&(0x7f0000000100)="69be25d6b6927106e2", 0x9}], 0x2}, 0x0) socket$kcm(0x29, 0x7, 0x0) 08:46:22 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x369, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1760.350109][T28104] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1760.375080][T28104] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1760.401583][T28104] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:23 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x35, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:23 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r3}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1e, 0x6, &(0x7f0000000340)=@raw=[@map={0x18, 0x4, 0x1, 0x0, r5}, @exit, @generic={0x4, 0x3, 0x0, 0x0, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @generic={0x9, 0xa, 0x4, 0x3, 0x7fff}], &(0x7f00000003c0)='GPL\x00', 0x0, 0x4a, &(0x7f0000000400)=""/74, 0x40e00, 0x10, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xe, 0x3, 0x100}, 0x10, 0xffffffffffffffff}, 0x78) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@cgroup=r1, r3, 0x4}, 0x10) 08:46:23 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f00000001c0)=0x2436, 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r5 = openat$cgroup(r2, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000300)=0x1) 08:46:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46f0}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x1) close(r0) r1 = getpid() r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0}, 0x10) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x4, 0x0, 0x8, 0xffffffff, 0x2, 0x8, 0x9, 0x0, 0x20}, r1, 0x6, r2, 0x1) r3 = perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x55cf, 0x0, 0xffffffffffffffff, 0x80f3}, r1, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x9, 0x93, 0xd8, 0x0, 0x0, 0x8, 0xa2800, 0x7, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, 0x0, 0x80, 0x1f, 0x1, 0x7, 0x81e2, 0x8, 0xfbdf}, r1, 0x9, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000001b40)='+,\'\x00') r7 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r6, r5}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000001400)=@l2tp={0x2, 0x0, @rand_addr, 0x3}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000001480)="cc0797f9a846d365c4f8e7a1281d08d330bd306f092b781faa42f29346a7c2c5bcadc32166e3d5ba9b3dcf82cae8829a7063b34e1b1c3784560583621c276d234f346a7f2ad5a2fff084bc9967a81997dd574a55fd2ca970a3659cf190d39cffe6baccb9ad6a0b6d25caa7b49a8822329a9b6dd6e80dbd7a3f7eff1d63f7da92fecc0869", 0x84}, {0x0}, {&(0x7f0000001640)="8f9f531092984152605cffdcaf982e91a9076b8ef09d794925c9e4ffeae6a5abc8b550305c72d509071e09d865898ee1945ef03a2f844148b336fd988480d5e427b99d9ea1c5ae5ab4eaee7aa1067125b87b16fbe6010aaea49e4c1f7a3e2f760407984c1673a6e5b08d2b57607d4f5fc4aa7d6ffb260cf357a415409548bc9c08a65d4ecd15dcfacad7789902dec7f1e1a8496d41967b1afe99242e08e824d5b25a2fc2ee07f4545a79c016da981d299bd23ca3ee801059de05473d7a4313969609", 0xc2}, {&(0x7f0000001740)="3aae2da2acf934b0ee09b951b622d72c68dc090d06d7c3648d92ca9d8a98b6a747c37bded469aa3466439ef606f0d87babe700d92f9f0b32d2a7e3588435ba6a4175070e7f0ed2f88a4b4c1632", 0x4d}, {&(0x7f0000001380)}, {&(0x7f00000017c0)="cd7bce6861070e12ce17eabbb087487709f8a3c672cd31a77871b53b8f2db1eab9569b9a8a145372e40e7469584f30b9c7d9b4962f3c8e9358521683d1ce0fc728e31c4b3dde360a0903d4a1b6e02a5da09fc863371c6276e32a68eb982396b838ebb060188e0f46b441c43230ce52503a25daa146137ba88649486319ff09413c5efcb28b982a56bbbe4e07bc4c55c58a6fae327e0984c1dcf45473d13e4ab30f5e9bf0601c204154186b37322978bc", 0xb0}, {&(0x7f0000001880)="be663946b0f378c68ba9dfe8cd0d28a288a6a01416aaaf4ffeb60278f7353042704b002592881a838d25c6d659429c87e17429f504919128ee813c1c5df41e575186da434f270dae86298b0762512affb5b1509e66f7782637cb351c254b207e", 0x60}], 0x7}, 0x800) close(r7) 08:46:23 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x36a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e0a0248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1761.182488][T28142] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1761.352071][T28142] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 08:46:23 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1761.452852][T28142] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:24 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x80, 0x8, 0x1e, 0x1, 0x0, 0x1ff, 0x4040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7ff, 0x4, @perf_config_ext={0x3, 0x81}, 0x8002, 0x7fffffff, 0x2, 0x3, 0x4, 0x5, 0x8, 0x0, 0x2, 0x0, 0x400000000}, 0xffffffffffffffff, 0x10, r2, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:24 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cv\xe4`9p\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000300)="10f6103dbf7310e418a336fed306c99318d23c52b5018768f8b66c29da49f0a8bc7b19fc614b39403ef33a0e0ebdd9f2df72ece8bd8b82a60406139da0e7329ab4631fe1fcc3d62d7ff289a832a4284a608cf5cec3f3f86c6634ef358bffd5a19ddc"}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) openat$cgroup_ro(r3, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e5a0248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:24 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x36c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x7, &(0x7f0000000400)=ANY=[@ANYBLOB="180000007f9000000000000006000000510bf4ff11000000950000d989d35f6db3ad917f0500000044a22000040000009500000000000800000000000000ae2e26a3d9fd8673e6523ab114a5321cd3ce360ea37a4d247b29ed9812ed9947545e55144a91d8b2b9b62137ef44afdbebc6c16bc735885cbecd34c3cdfb6a93a14dbb71caec570e326bf790ba493f8638376c94c467aed2660ecbb3e55448dfa98804901de9cf088d1e1b5585ac0200551af009223d66f9d7e413669805c757751d294c601589df7070c99cae055b1d2c0ea2239c0db5bfdae3cc9b19f4b86693b9241a092b0d52f199270c3f992928f4cb737826e7417d04e4f28b4e79936ec86c6a5d4d72adf60b"], &(0x7f00000001c0)='syzkaller\x00', 0xff, 0xe7, &(0x7f0000000200)=""/231, 0x40f00, 0x15, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0xd, 0xffffffe6, 0x4}, 0x10, 0xffffffffffffffff}, 0x78) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r2}, 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000006c0)={0x5, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_lsm={0x1d, 0x8, &(0x7f00000005c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x6b9c, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0xd, 0x0, 0x6, 0xfffffffffffffff0, 0x1}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @map_val={0x18, 0xa, 0x2, 0x0, r3}, @ldst={0x3, 0x0, 0xdf82cfdee3266e20, 0x0, 0x7}], &(0x7f0000000600)='syzkaller\x00', 0xfffff000, 0x0, 0x0, 0x41000, 0xd, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000640)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x4, 0x5, 0x3, 0x1}, 0x10, r4}, 0x78) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030015000511d25a80648c63940d0124fc6009100640014102000200001737153e370a0001800a000000d1bd", 0x33fe0}], 0x1}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000540)={r5}) [ 1762.531357][T28167] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1762.559149][T28167] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1762.590793][T28167] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1763.187522][T28177] netlink: 208832 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1763.219182][T28195] netlink: 208832 bytes leftover after parsing attributes in process `syz-executor.3'. 08:46:25 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x36, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:25 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x8) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:25 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7fff}, 0x0, 0xffbffffffffffffc, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r4 = getpid() ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x7, 0x81, 0x0, 0x2f, 0x0, 0xfffffffffffffff7, 0x1, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000480), 0xc}, 0x2012, 0xffffffffffffff64, 0x3, 0x6, 0x120, 0x401, 0x77af, 0x0, 0x4, 0x0, 0x8}, r4, 0x10, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab821981780d3718c1f644ae8ced6ae6ead17e731ac2f473cbf2829a3716c50624a6c2a0bf797be7b246fe3aff75ae8b27ebcc8c4cd10461cd2a3d90043a97dd8b4dbc5b53885a6fe0aed4ad0a8ad44a2b8c6b1df0f17a4ee2b4353cf3e177ede5e0f5258"], &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) 08:46:25 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x36d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e5b0248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:25 executing program 3: recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x894e0200, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r1, &(0x7f0000000440)={&(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}, 0x4, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000200)}, {&(0x7f00000003c0)="2a8fb16f65fc4832124d841271b2e9509bb62f98cef48f6c6e148eb5d18be2641ff99d6935d8c3921d011f231095c7ffaffa574854d1caa763fbd7b12705055545b9ab0909cdba7a7a96e29f4667514e4fc510de8321ca3915023589589503beee933f43deaf6be8f2719d86a3fde7e397cc", 0x72}], 0x2, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x700}, 0x2000c040) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000a80)}], 0x2, &(0x7f0000000a40)=ANY=[@ANYRESOCT, @ANYRES16=r0, @ANYRES16], 0x1158}, 0x20000811) recvmsg(r1, &(0x7f0000000200)={&(0x7f0000000300)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000480)=""/115, 0x73}], 0x2, &(0x7f0000000500)=""/92, 0x5c}, 0x40002000) [ 1763.544316][T28209] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1763.578388][T28209] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1763.626392][T28209] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1763.772235][T28224] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 08:46:26 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b162dcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) gettid() 08:46:26 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x36e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1763.852397][T28224] batman_adv: batadv0: Removing interface: @þ 08:46:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e6c0248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1763.912565][T28224] @þ: Cannot enslave team device to itself 08:46:26 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x40000002b) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x7, 0x0, r1}, 0x14) r2 = openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) close(r5) openat$cgroup_subtree(r3, &(0x7f00000001c0), 0x2, 0x0) openat$cgroup_ro(r2, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() [ 1763.961758][T28226] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 1763.990573][T28226] bridge0: port 3(@þ) entered blocking state [ 1764.051942][T28226] bridge0: port 3(@þ) entered disabled state 08:46:26 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x36f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1764.246632][T28226] device @þ entered promiscuous mode [ 1764.304110][T28226] device team_slave_1 entered promiscuous mode 08:46:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e370300038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1765.094053][T28224] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 1765.110102][T28224] device @þ left promiscuous mode [ 1765.135213][T28224] device team_slave_1 left promiscuous mode [ 1765.150224][T28224] bridge0: port 3(@þ) entered disabled state [ 1765.170427][T28224] @þ: Cannot enslave team device to itself [ 1765.193684][T28227] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 1765.207727][T28227] bridge0: port 3(@þ) entered blocking state [ 1765.238134][T28227] bridge0: port 3(@þ) entered disabled state [ 1765.265736][T28227] device @þ entered promiscuous mode [ 1765.287517][T28227] device team_slave_1 entered promiscuous mode [ 1765.312834][T28254] netlink: 196640 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:28 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x37, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:28 executing program 2: perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, &(0x7f0000000000)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) openat$cgroup_ro(r4, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:28 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x40000002b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0x6e, &(0x7f00000002c0)='H\xb0\'\x90\x06\a{\x8a(w\xf8+\xf6\x8fQ)\x9d\xcf\xd1\x10P\x1e\xd2du\xcd\xc9w\x00\xd5(\x8f\\\x05\x8f\xcf\x89\xa0\x9c\x98\xddT\xec\xa2%\xb4\xda4\xf5\xbe\xf9Rj_\x94\xd2\xbe\x97\xd1}T\xa7\xfe\xe1\x16\xae]J\x8b\xba`\x94\x80\x94K\x9c\xa0\xd9Y\\\\K_u\xbby\xdc-\\\xdf!\xebX;\xae\x7f\xee\xf8\xd3Q_b\xb6cn(h\x1d\x96\xd4'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r2, &(0x7f00000000c0), 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x1) close(r5) openat$cgroup_subtree(r3, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:28 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cc2, 0x22005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) close(0xffffffffffffffff) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000003c0)='./file0\x00'}, 0x3) socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x1}, 0x7, 0x4}, 0x80, 0x0}, 0x20088045) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0xf, &(0x7f0000000400), 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/time_for_children\x00') sendmsg$inet(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x2, 0x2, &(0x7f0000000280)) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f0000000000), 0x4) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0), 0x2, 0x0) socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map, r1, 0x12, 0x1}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={@map=0x1, r1, 0x1c}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f00000002c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) 08:46:28 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x370, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e370348038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1766.015241][T28282] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e370448038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:28 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x371, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x4, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:29 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b6d656d6f727920e76905002d637075202d6d656d6f7279202b696f202d6d656d6f7279201785b4b01b5e4f1a8b31b89ddfe0d2785e19a58058ddb34c7aa656086935b731d325a5ac8ebfeeb73f8f0ec6bede0be12bd6915d72"], 0x25) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000540), 0x2bf70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000300)='%\x00'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:29 executing program 3: ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='freezer.self_freezing\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'batadv0\x00'}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000100)=r1, 0x4) r3 = openat$cgroup_ro(r0, &(0x7f0000000140)='io.stat\x00', 0x0, 0x0) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001280)={r0, 0x10, &(0x7f0000001240)={&(0x7f0000000240)=""/4096, 0x1000, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000012c0)=r5, 0x4) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001300)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000002ec0)={&(0x7f0000001340)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e20, @remote}, 0x4, 0x1, 0x3, 0x3}}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000013c0)="5f1ec58653dad2241f30dabf4236fd3b65203ca4ca02c49cd0c822697d6b910ba1ca6f1122a7d7026c34b47ddb1876fbbf763dba1d519574c2458b32754f07f1571f9a9934a27a2f00088087024a6eb405627a942814476832fc49d2150151bc1323ea4d7f4389382dda40425f79925c6404cd798d71e89a9a92765601e4eebdfbfdc0b28f7d752cf830884495383aaf53512122a4ec8b631ef0715c308623c63abb6c2f2090ce80f4bd7e0d7f9a33bbe60e122a35bf2ddba11475b285802065099134e8fbe448fa03b2810601ea359b2e8e82", 0xd3}, {&(0x7f00000014c0)="ccc10e18bab01e2d3aa3d9f05455fde63dfda4484fb854e7f867da447860876082d68c9a4442609866e74ea3e4c8211084", 0x31}, {&(0x7f0000001500)="3b5fca494b381c091893631342fbf66fc816607d9b81147829a582323965b01a4270871dc8f3d7fb5b19fac91059701f19c4ecd73df9aac9a0a1a0a7409c220273005be2b54ed3ca0ddc66906b34ec95fe566eb4d11e80e091ce5368c6e37bf85518566be3414858aa7730c9482932869a4f8d4de61701f815df74d90c395a598f9e76b1be0972a2a514b32b0fb53f15d585409c4791353c16963e4aa1312e2cd043c252a8812ec9160100d016ce0c3c62cf43407c1b5ec1c1affb9400451ed0efdc3ef7", 0xc4}, {&(0x7f0000001600)="d95bd613edc847bd08cbc565429fcd9779e7db0adfca53350d9fb99da5234c1f94ad282cd29c9a0e8ebaf9ecae3e872ee8d3d80b98576036ec5724c491165d4505dc85c08835c074190be5e2bd6831765d43ccab7f5ae25b345424bab08b6714803aa1dacd432356c5ec8492dc0cb5fbcf20a0aa37b8598466d88ff244a36b0976ee208b32342ef8eb31ab97c1b6156c985161b638b48a64c654408c6cef373fbd855bd1180597ab9e61d283e777840bb769cd1f07ccb45ee70376670349a58e3fb23231094dcf7fe68b04ee7ea316290c3cdab72d5b0fbdbf9dd8cfae514cf4b0d13eaa86b2d3", 0xe7}, {&(0x7f0000001700)="e545140ebba5181796458a0943a84d7fc149d59de11f2b3a4f21e32e9ad89426f0c12db466eea88ceb53881ac178454d60fda0f1f21fb99b8bc79543e944a669cf3fc16c5e078bc3ceb9fa5291578c9b3994206a2496411309973974f874ab9edda5e4f620ef79eed86a09833872f61f0dcf185997c0f830b7fe774069fb16e47251f554645869d5378818cae86ba57e406b8b43e6fa732fa7012d0e45f3c9a93828582cf10eee3f10310f8fa9f2334afcf4e2fad21e852cb475f833abfa2cddb5be28ed04b06862078e0a7eb6b1ed0fe8f04cdb4e8067d1649630603cd478acf04da5fdf36e2ee053da72a670d1f3e6e6e7a3cc76e137e8a26a226247a5", 0xfe}, {&(0x7f0000001800)="8ca1cdd22c857e25a771692e", 0xc}, {&(0x7f0000001840)="5551285557144f9047608db33cca439c0c0f2fed9fd9340baf282d1d89f367339da28037260894bc3f17633d59d74eca8efd4531262e354fdad669c7721614ea2b21e8439a271e8dc49ed0c95fceba5cde7a103bc8e657f00e9d987f92c96488ddd411d5ddfa4b4f01c5335140413ebc854f6ee6f110a7d33a97c8cb75769acf8218754173f90691020924b2d97625", 0x8f}, {&(0x7f0000001900)="aa1272cecd4b3b40588d44314bed6dca3fb571f6eb74009967cf04c3fe182dba5d1470306251d733cfdb8fdf4e519866498f0185ea0a3cd5d22ed47c9d72a2c5fc01d61ea1087b9b4e89e5a3ac089e35f010076a5d4f6c850ea09e5b029f7da89db9390f32989edb1fadc70ef9fca2787cd80d8fb2e14f3dac0815cd2e55133dc8ad600e7d1cb04f2c421223ceb9041058d57bde8c673db976fc9d6f7f6c211b45966033456e746d7272fa1975269a3c4e9125d70074fa60893df4ea15fa2f4030a4e8b33eb4d24ea71472ac4d7ca5b417f15bf421a711f2cb335726f055490a8877c4858636a389e0f5c9868f9f", 0xee}], 0x8, &(0x7f0000001a80)=[{0x20, 0x10a, 0xc4f1, "4384d349ffbcd44bfc5cb50a65125f"}, {0x88, 0x116, 0x7, "b45102f0d0289352c05fa5ebe4c3df0a1c9f42fbe30ce84513f5d469601a504e7338d6a5c4c0a38dbaaee76a5b219255a0ba997afaddde2d09e3fc4a4e4809a8aa937dae4ce530f662e11ff6aa6e817c15b893d1a6fe9460a370d8be3be60d970fcaa7f3ecaebbca65808876f1b96f5abb62b903dc"}, {0xc8, 0x112, 0x8, "e0af68168acfbe06aa0e4c44aabedf41af5fe6cd91556553c5e8bc77971ce8d997cfba17b62f82b33c0a21beab55251b6bc9b809777a6a4c589587b8374385146002e4deb549598bd5a2b6ca90ffd1cf3e105527bf5a8df7c942ae805842c64d06c73acd17501d9cff5768903bfa860904974cc824060b8bf7871ffb678c81721bc5bc84c5c1f0d944c621b600a3f1737bf5461b6678aefca4279d59f03be689135c5ce180b7685c572b05067c3c9ab11819"}, {0x110, 0x10e, 0x8000, "5d2bb7077931bf1a64cc883f7bb1c99689896236eec5c89cbaaf6facd4d80a6aab07e84c1a7b91e9d3b8f17413a03b101319dd729eaaf5458515055a670673802e8f428890de56757edd4261ef35cfd05c7d0169950bc3936df3f7ba16b7a2fa2b65504ffd42cf30d30ef17e21cba930bbc3f94496c811b3d2fa301417b0708ca562c874df8538cc8da71505f6963654f3d540a21507ac6f4d6ae4ab1e9456f73c8a463aadc5a62b7ba93d60a2e2c6c7b734c079c253423eeb5aeb907d3f90b0f4e692418c36dd1f364bbb9b6fd2391b5fd01a303768d14167a5f1352115d7a8b5e33faf4c6d0bbbc2b9841ceb23e027df6f690925e3701f728e9db8"}, {0xf0, 0x10c, 0x800, "848a5dec182c64c14759886d12df431f4eef2558e82f94a079ff3db438de96f0300c70ce51bfbdce4ab523878e155e9dd219cce7497c015560628d1649446eb6e812cfb342d1619412832ffc220ad93453abe6255d398317d9052795e64458a9c36456d8da0c61107ba77a08e3cfe8cec433b16157e0078f3d52d2c4ec8ab5c06e9c60b09d8da12afcff1e2a2de2615012ecc02c33be761807d484a9b89fd76b76f77830efc8533638ecea2d083e1a0c7e4191fad73afeaea04e047a917883c5f227640c4e2894b5cb5fb04b4b03b0486b8ee14354a715bf30bfd2fe"}, {0x1010, 0x10c, 0xd4, "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"}, {0x98, 0x3a, 0xd1, "9883acad502d6e823f3c7a8e05d8ad8740d0dff8b84e55bbb0349a5ee3d414e7cce13995fac95fdb830b39cc7a6ad68ce71e39d65e5b7c7f87247b43fb38964683332795ffe64b1c6102841d97f3809efc86ef14832f9afdbb5edeb84013d346c520176220f7a6f032eaf8e061acb2b5979ddd16aaf8e7d56982a4216419d536b330d7b880f639"}], 0x1418}, 0x20000000) r7 = openat$cgroup_ro(r3, &(0x7f0000002f00)='rdma.current\x00', 0x0, 0x0) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000002f40)={r7}, 0x8) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000002f80)={'vcan0\x00'}) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002fc0)={0xffffffffffffffff, 0x3}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000003040)={r9, 0x28, &(0x7f0000003000)}, 0x10) r10 = openat$cgroup_ro(r7, &(0x7f0000003200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000032c0)={0x11, 0x5, &(0x7f0000003080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x8000}, [@jmp={0x5, 0x1, 0x6, 0x1, 0xb, 0x2, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x61}]}, &(0x7f00000030c0)='syzkaller\x00', 0x100, 0xf0, &(0x7f0000003100)=""/240, 0x40f00, 0x11, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000003240)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000003280)={0x2, 0x9, 0x8, 0x800}, 0x10}, 0x78) [ 1766.807112][T28310] validate_nla: 3 callbacks suppressed [ 1766.807137][T28310] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1766.860299][T28310] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1766.875376][T28310] netlink: 178204 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:29 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x372, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:30 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:30 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000008c0)={0x1, 0xcc, 0x0, 0x6f, 0x5f, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, 0x0, 0x40006, 0x0, 0x0, 0x2, 0x200, 0x4, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0x5}, 0x0, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, 0x0, 0x40000, 0x80, 0x10000, 0x7, 0xff, 0x3, 0x1}, 0x0, 0x10, r1, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x70, 0x6, 0x5, 0x58, 0xff, 0x0, 0x1, 0x10000, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x48504, 0x8, 0xdd, 0x1, 0x9626, 0x7, 0x3}, 0xffffffffffffffff, 0x7, r0, 0x8) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x1, 0x0, 0x9, 0x4}, &(0x7f0000000300)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@typedef, @ptr={0x7, 0x0, 0x0, 0x2, 0x3}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0]}}, &(0x7f0000000640)=""/137, 0x3f, 0x89}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_ext={0x1c, 0x5, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000010f30000008bef2d26712760b23b4e9b319735f7000000000080000000180000d5841b99327a6fa0328f6b093801836a97d9dc96c3ad3d8577bae44ac582ef8309b4986dd05695f0824b0c0a5470e7c8de2821dec2f6939b3c97091656cbe1e51d2779a91fa5ea103c4cc879820a67ae93b9d3cae51ab95811f5a8bf3cca345727a6727cd6031b8125dac121528affbf12b81ae2c85f", @ANYRES32, @ANYBLOB="00000020000000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0xd2de, 0x0, 0x0, 0x166fb7d89fdfee9, 0x16, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x7}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x9, 0x5, 0x8}, 0x10, 0xfc2b}, 0x78) perf_event_open(0x0, 0xffffffffffffffff, 0x20000000000001, 0xffffffffffffffff, 0x1) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000002c0), 0x12) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180), 0x4) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x7a00, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0xff, 0x2, 0x4, 0x25, 0x0, 0x5, 0x24000, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7170, 0x0, @perf_config_ext={0x400, 0x2}, 0x48, 0x2e, 0xfffffffd, 0x9, 0x1c0, 0x7, 0xaf, 0x0, 0x7, 0x0, 0x100000000}, 0x0, 0x0, r3, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x5, 0x6, 0x6, 0xbc, 0x0, 0x5, 0x8002, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x1, 0x1, 0x3, 0x17, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 08:46:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e370548038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:30 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000740)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000700)='cgroup\x008\x95\xe8\x14\x99\xe4\x0e'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x200000b8, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f00000003c0)='GPL\x00', 0x3f, 0x72, &(0x7f0000000400)=""/114, 0x41100, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0x4, 0x7fc000, 0x7}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000600)=r1, 0x4) mkdirat$cgroup(r0, &(0x7f00000002c0)='syz1\x00', 0x1ff) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x40000d) close(r1) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='pids.current\x00', 0x0, 0x0) openat$cgroup_type(r3, &(0x7f0000000240), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)={[{0x2d, 'pids'}, {0x2b, 'rdma'}, {0x2d, 'pids'}]}, 0x12) 08:46:30 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x373, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1768.200707][ T110] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1768.253476][T28358] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1768.296683][T28358] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1768.376809][T28358] netlink: 178200 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1768.464157][T28360] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 1768.536994][T28360] device @þ left promiscuous mode 08:46:31 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x374, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1768.583984][T28360] device team_slave_1 left promiscuous mode [ 1768.647451][T28360] bridge0: port 3(@þ) entered disabled state 08:46:31 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, &(0x7f0000000000)) perf_event_open$cgroup(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x4, 0x7f, 0x6, 0x0, 0x1, 0x8004, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, 0x0, @perf_config_ext={0x1ff, 0x4}, 0x40340, 0x4, 0x9, 0x3, 0x7fff, 0xfd, 0x2, 0x0, 0x4, 0x0, 0x100000000}, r4, 0xc, r0, 0xc) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) close(r5) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e370648038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1768.733610][T28360] @þ: Cannot enslave team device to itself 08:46:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000240)='ext4_es_remove_extent\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x0) perf_event_open(&(0x7f0000002a80)={0x0, 0x70, 0xfa, 0x3, 0x7, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x0, 0x80, 0x101, 0x2, 0x0, 0x3, 0x6, 0x8}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000480)='hwmon_attr_show_string\x00', r3}, 0x10) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x9, 0x40, 0x4, 0x5, 0x0, 0x8, 0x80000, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x4}, 0x8, 0x200, 0xd6c, 0x1, 0x6, 0x200, 0x1, 0x0, 0x82f1, 0x0, 0x100}, 0x0, 0x6, r5, 0x3) close(r3) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(r6, &(0x7f00000001c0)='pids.events\x00', 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f00000003c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c08f25e5a316728e5ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a4702bf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"/123], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() [ 1768.794847][T28365] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 1768.908996][T28365] batman_adv: batadv0: Adding interface: @þ 08:46:31 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x375, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1768.949142][T28365] batman_adv: batadv0: The MTU of interface @þ is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1769.093359][T28365] batman_adv: batadv0: Not using interface @þ (retrying later): interface not active 08:46:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='tasks\x00', 0x2, 0x0) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x6611, 0x0) openat$cgroup_ro(r4, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup(r4, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f00000001c0), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45d9952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7bf18ed4b670ba8724156fe3aff75ae8b27ebcc8c4cd"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() [ 1769.645392][T28383] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1769.670011][T28383] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1769.700519][T28383] netlink: 178200 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1769.736320][T28370] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 08:46:32 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x39, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:32 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000300)=0x100000001) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:32 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x376, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e370748038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:32 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x7, 0x5, 0x20, 0x7f, 0x0, 0x4, 0x88cc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0xd}, 0x0, 0x7, 0x4, 0x1, 0x5, 0x4, 0x8, 0x0, 0x5, 0x0, 0x1}, 0xffffffffffffffff, 0xa, r0, 0x1) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x5, 0x0, 0x1, 0x0, 0x5, 0xc802, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, @perf_bp={&(0x7f0000000340), 0x9}, 0x10000, 0x2, 0x3, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r2, &(0x7f00000000c0), 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000540), 0x2bf70) perf_event_open(&(0x7f00000004c0)={0x3, 0x80, 0x7f, 0x5, 0x3, 0x20, 0x0, 0x3f, 0x200, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9067, 0x0, @perf_bp={&(0x7f0000000240)}, 0x10008, 0x8, 0xc24, 0x5, 0x1, 0x4, 0xffff, 0x0, 0x10001, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r3, 0x1) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1f) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) close(r5) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82598178077a904256c9748f516aa8f21b17e1849128c1f644a473cbf5ac09e67ba760fe22829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c42217d01bd488e8b44b52f42b3685a56938d1f5656aba92cda17714ad74108246192cf39badd4beab6b73f5e3d0d3c45d"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0xff, 0x96, 0xff, 0x8, 0x0, 0x0, 0x40, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x20, 0x4, @perf_bp={&(0x7f00000002c0), 0x2}, 0x5000, 0x7fffffff, 0xffff8001, 0x7, 0x2, 0x6, 0x8f74, 0x0, 0x3, 0x0, 0x6}, 0xffffffffffffffff, 0x3, r0, 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x3, 0x20, 0x6, 0x8, 0x0, 0x5, 0x44019, 0xe, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3f, 0x2, @perf_config_ext={0x4, 0x1}, 0x2020, 0x0, 0x1, 0x1, 0x43, 0x20, 0xf493, 0x0, 0x6, 0x0, 0x101}, 0xffffffffffffffff, 0x10, r1, 0x2) close(0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080006007c09e8fe55a10a0015000200142603600e1208000f0000000401a800160008000400e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x40, 0xe, 0x7f, 0x1f, 0x0, 0x7, 0x98004, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1f, 0x2, @perf_bp={&(0x7f00000001c0), 0x7}, 0x4040, 0x0, 0x4, 0x0, 0x7, 0x26a, 0x8000, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x9, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1770.531983][T28425] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1770.631510][T28425] netlink: 178200 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x40000002f) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYRESOCT=r4], &(0x7f0000000280)='GPL\x00', 0x3ed7, 0xfffffffffffffe39, &(0x7f00000002c0)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40305839, &(0x7f0000000000)) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000001800)=ANY=[@ANYBLOB="9feb010018000000000000006500000065000000080000000f0000000000000905000000070000000100000f01000000020000000002000008000000220b0000000000000901000000040000000000000b0300000000000000000090ec4370431c2007f5cca60000030000000004000000030000000100000009000012000000050000000019006200000000003061612e1e6100"], &(0x7f00000016c0)=""/163, 0x88, 0xa3, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x9, 0x9, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7fff}, [@map={0x18, 0x2}, @call={0x85, 0x0, 0x0, 0x18}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @map={0x18, 0x0, 0x1, 0x0, r6}]}, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000006c0)=""/4096, 0x41100, 0x0, '\x00', 0x0, 0x1a, r7, 0x8, &(0x7f0000000340)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0x5, 0x5, 0x2}, 0x10, 0x0, r5}, 0x78) [ 1770.714590][T28426] netlink: 156 bytes leftover after parsing attributes in process `syz-executor.3'. 08:46:33 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x377, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x81, 0xfc, 0x0, 0x3c40, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x2, 0xffffffffffffff7e}, 0x0, 0x1000000000000000, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000300)='\x00'}, 0x30) r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x0, 0x35, &(0x7f00000002c0)='\x89\xecq\x81jr\x93\"\x97?*\x94\xa2\x02\xc4)\x12\xa8\xa0\xdb\xb8[\xbf\x13\xeb\a\x15\x9d:\xbf\r.=j69\xeb2{\xff\b\xd2,\xb3_\x95\xe2\x92i\xf0\xed$\x86'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x8, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e370848038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x281, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'netpci0\x00'}) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) 08:46:33 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x378, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1771.751127][T28448] netlink: 178200 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:35 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3a, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:35 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0xfffffffffffffddd, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305839, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r0, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r2, &(0x7f00000000c0), 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x8, 0x41, 0x4e, 0x0, 0x5, 0x4915f, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x3, 0x4e4b}, 0x2094, 0x2854, 0x6, 0x0, 0x1000, 0x30, 0x1, 0x0, 0x8001, 0x0, 0x9}, 0x0, 0xa, r4, 0x9) openat$cgroup_ro(r1, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f00000001c0), 0x9) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000240)=0x40) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) close(r5) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="296c16bef7532f137b2946d06b164bcc31e157a48ff2dc493b52840f257f4c0844b2ce712385cf02000000fc83a45da6d29952a9cab82198178049128c1f644afc8151019e58980150624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"/118], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:35 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r5, &(0x7f0000000540), 0x2bf70) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0xe, 0x1, 0x9, 0xc4, 0x0, 0x1, 0x1, '\x00', 0x0, r5, 0x1, 0x5, 0x4}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:35 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x379, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e370948038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000002d008188040f80ecdb4cb9cca7480e0001000000e3bd80000000000000320a000f00000202bc80000112", 0x2e}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6611, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000000)) sendmsg$kcm(r2, &(0x7f0000002500)={&(0x7f00000013c0)=@llc={0x1a, 0x100, 0xec, 0x9, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x80, &(0x7f0000002440)=[{&(0x7f0000001440)="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", 0x1000}], 0x1, &(0x7f0000002480)=ANY=[@ANYBLOB="300000000000000006000000f60000000479f6cd783ed4244b280226be8201c21854ae78d47f75941ffed2360000000048000000000000004ae47cda06510000880c27fe8e4e868823f5f813781eeb0f8acabc7324a702eb6015e3370d891eac11106b69d70c122d973d4add59ce4f0e245d560000000000"], 0x78}, 0x1) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup(r1, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) recvmsg$kcm(r1, &(0x7f00000002c0)={&(0x7f0000000140)=@rc={0x1f, @none}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/195, 0xc3}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2, &(0x7f0000001340)=""/78, 0x4e}, 0x100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x6611, 0x0) openat$cgroup_ro(r3, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup(r3, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000000), 0x4) [ 1773.191464][T28500] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1773.206348][T28501] validate_nla: 5 callbacks suppressed [ 1773.206370][T28501] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1773.328624][T28501] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1773.340008][T28500] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1773.405755][T28501] netlink: 178196 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:35 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x37a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:36 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) r4 = gettid() perf_event_open(&(0x7f0000002a80)={0x0, 0x70, 0xfa, 0x3, 0x7, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x0, 0x80, 0x101, 0x2, 0x0, 0x3, 0x6, 0x8}, r4, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x7f, 0x6, 0x3, 0xd9, 0x0, 0x11, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x11d1, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x2000, 0x10001, 0xff, 0x8, 0x80000000, 0xffffff01, 0x8, 0x0, 0x7ade, 0x0, 0xb3ce}, r4, 0xc, r2, 0x5) close(r3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40305839, &(0x7f0000000000)) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x55, 0x80, 0xcc, 0x4, 0x0, 0x0, 0x40400, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0xf3b, 0x7}, 0xa000, 0x8000, 0x9, 0x6, 0x1f, 0x8, 0x20, 0x0, 0x632, 0x0, 0x9}, 0x0, 0xe, r5, 0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:36 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0xea, 0xff, 0x81, 0x9, 0x0, 0x89, 0x3000, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x10001, 0x4, @perf_bp={&(0x7f00000003c0), 0x4}, 0x40404, 0xffffffffffffd2ba, 0x80000000, 0x9, 0x400, 0x232c, 0x2, 0x0, 0x5, 0x0, 0x5902}, 0xffffffffffffffff, 0x4, r3, 0x1) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000300)={0x4, 0x80, 0x4, 0x0, 0x6, 0x2, 0x0, 0x5, 0x4400, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8000, 0x1, @perf_bp={&(0x7f00000002c0), 0x4}, 0x400, 0x8, 0x4, 0x0, 0x100000001, 0x401, 0x6, 0x0, 0x4, 0x0, 0x76f}) gettid() 08:46:36 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x5, 0x1, 0x0, 0x4347}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x20, 0x3, 0x7f, 0x3, 0x0, 0x6, 0xfe80928d25aed8c0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x8, 0xfffffffffffffff7, 0xfffffffa, 0x9, 0x1f, 0x0, 0x8}, 0x0, 0x2, 0xffffffffffffffff, 0x8) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x3f, 0x8, 0x0, 0x1f, 0x0, 0x81, 0x4400, 0xd, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x332, 0x0, 0x0, 0x40, 0x1, 0x7, 0x49450efb9c998ae6, 0x8000, 0x9, 0x4}, 0x0, 0xd, r2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001a00), 0x4) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000700)=0x2) r3 = gettid() socket$kcm(0xa, 0x2, 0x11) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x4566c34818da8298) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0xdf, 0x0, 0x4, 0x0, 0x1000, 0x1021, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x2}, 0x0, 0x2, r4, 0x8) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xff, 0x66, 0x1, 0x9, 0x0, 0xfffffffffffffff7, 0xc0002, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x18a, 0x8, 0x3f, 0x5, 0x1406, 0xa2b8, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x1, 0x1, 0x2, 0x20, 0x0, 0x100000001, 0x20, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x10001, 0x2, 0x0, 0x4, 0x200, 0x81}, r3, 0xc, r4, 0x2) openat$cgroup_ro(r5, &(0x7f0000000280)='cgroup.events\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f00000000c0)=r2) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='start_task_reaping\x00', r2}, 0x10) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e370a48038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:36 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x37b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1774.507018][T28530] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1774.526055][T28530] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1774.568637][T28530] netlink: 178196 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1774.626427][T28530] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1774.635787][T28525] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 1774.650646][T28530] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1774.660948][T28525] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1774.685794][T28530] netlink: 178196 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:38 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_ro(r0, &(0x7f00000002c0)='devices.list\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:38 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="2d57696463202d72646d6120b08a4c291c312bb58b392b4943f745da"], 0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd30}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x2}, @jmp={0x5, 0x0, 0x5, 0x5, 0x4, 0x6, 0xffffffffffffffff}, @map, @jmp={0x5, 0x0, 0x8, 0x7, 0x4, 0xffffffffffffffe0}, @call={0x85, 0x0, 0x0, 0x26}, @generic={0xf8, 0xb, 0x6, 0xffff, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000240)='GPL\x00', 0x7ff, 0x22, &(0x7f00000002c0)=""/34, 0x41000, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000300)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0xfbffffff, 0xff, 0x1}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) r4 = gettid() r5 = getpid() r6 = perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xd8, 0x7, 0xd6, 0xe0, 0x0, 0x1, 0x10000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x40, 0x0, @perf_config_ext={0xff, 0xfffffffffffffff8}, 0x2c04, 0x7b7, 0x7, 0x8, 0x1ff, 0x9, 0x6, 0x0, 0x5, 0x0, 0xff}, r4, 0x2, r2, 0x9) openat$cgroup_ro(r2, &(0x7f0000000600)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0x0, 0xa6, 0x8, 0x20, 0x0, 0x6, 0x50, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x64, 0x4, @perf_bp={&(0x7f00000004c0), 0x3}, 0x5022, 0x0, 0x8f0e, 0x8, 0x40, 0x3ff, 0xffc1, 0x0, 0x3db6, 0x0, 0xffffffff}, r5, 0xc, r6, 0x1) 08:46:38 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x37c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e370b48038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:38 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3b, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:38 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='cgroup.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000540), 0x2bf70) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x6611, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000400)='memory.events\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f00000003c0), 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x6611, 0x0) openat$cgroup_ro(r3, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup(r3, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000001000000000000000800000095000000000000001800000001000000000000ffffff950000000000000095000000000000000896f9ff0100000085100000040000001800000000240000fbff000001000000183a0000030000000000000000000000950000002000"/120], &(0x7f0000000080)='syzkaller\x00', 0x81, 0x15, &(0x7f0000000180)=""/21, 0x41100, 0x14, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f00000002c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xa, 0x95, 0x6}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x10000000, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000014008501040400000000002e0a0a0ce22c000000160001808eb3d81fc77948f328995a017c7b58510600", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) [ 1775.751624][T28578] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1775.826326][T28578] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1775.968230][T28578] netlink: 178196 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:38 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x37d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:38 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000240)={r2, r0, 0x7}, 0x10) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() [ 1776.159308][T28578] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1776.238848][T28578] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1776.399604][T28578] netlink: 178196 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:39 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3a, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:39 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x37e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e370c48038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:39 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r1}, 0x8) openat$cgroup_ro(r3, &(0x7f00000002c0)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:39 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0x8a, 0x3, 0x8, 0xb7, 0x0, 0xe9, 0x80080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f00000001c0), 0xc}, 0x40, 0x0, 0x9, 0x8, 0x4, 0x5, 0x9, 0x0, 0x8, 0x0, 0x40}, r3, 0x8, r2, 0x7) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7bff420000aff75ae8b27ebcc8c40700461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:39 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x37f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:40 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x6611, 0x0) openat$cgroup_ro(r4, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup(r4, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f00000001c0)='freezer.self_freezing\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95d321ecfa47a57257f4c0844b2ce712385cff50a2a13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d9003942e31e6aaf2e63591510d4436e3bbce1644c7bd56403421255c54dab2bd200116bc692e21614daa2773a3089bd97dddf406659c748"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() [ 1777.915352][T28609] netlink: 178196 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:41 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3c, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:41 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000002a80)={0x0, 0x70, 0xfa, 0x3, 0x7, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x0, 0x80, 0x101, 0x2, 0x0, 0x3, 0x6, 0x8}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_ext_load_extent\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, r2, 0x0, 0x6, &(0x7f0000000340)='+^[@\\\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:41 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x380, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e370f48038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:41 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x40000002b) openat$cgroup_ro(r3, &(0x7f00000001c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) close(r2) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2c6712385cff50a2b13fc83a45da6d29952a9cab8198214cb49128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b5ae8b27ebcc8c4cd10461cd2a3d900000000000000"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() [ 1779.283936][T28663] validate_nla: 2 callbacks suppressed [ 1779.283960][T28663] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1779.300470][T28663] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1779.352415][T28663] netlink: 178192 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1779.420291][T28663] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1779.439217][T28663] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1779.447359][T28663] netlink: 178192 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:42 executing program 3: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3f, 0x0, 0xff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x100, 0x0, 0x5, 0x7}, 0x0, 0x7, r0, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x7, &(0x7f0000000080), 0x4) socketpair(0x8, 0x1, 0xd4e, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000000300)={&(0x7f0000000140)=@ethernet={0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1e}}, 0x80, &(0x7f0000000280)=[{&(0x7f00000001c0)="83d7c7d85a761e297abe1cf7e2cdbc9d11068237b81740d153451ab251", 0x1d}, {&(0x7f0000000bc0)="0e342ae576fec30dad8191cdddf6080b393a2dc028667b441badc6afb42b9259b198049b5df32514e3f71281887f979394b9129d7094c261d55cac3ff950c3e5d52d28dd4b8b0394ed22e7d9c68bb86be23b93bace24cab790c749f4058058bf0b0c78c6b7f9329bcbf1dbf39296b49b7ad23aa6176af959df19810a396dd98c02b79a0d62cf9cea3049fb4520128d9427486e215102513e37a825a8dd675e4f9ceb5b8eab2693c9aa9911e583ecf1a626e6c675c51e3d78d449eba05b311f7d266a5d713cc556edd97f401ba6c39fb8aafa1d90420c91588022bc152a60f28dfaa952fbe5d650ac611a93a7efeb623168a08771779488742cf2760ad58d011cf5890d1d1a5070528cba3c541239ea77d93637b7a6b02ac6eca7159453506b92e5eadd5f1ddfc928be7096faf95fab996c6a5eb6e9ab8150ee10fc91da83a4365b97fe33078eec0235387bbe2040b51137f59074f0216e5c87903defae09265cf830b59a771c1ec0daf1b5240f48ca6ea0c066920453a58cdd6f19c92d3f61ec19b4f38359e80f2caccfabed99040c3af2e7f00123be08215f0a7d15e4f46aa8c38dc554bafdfdcb87c5db1db436feb121ce019fefa17f8a1752d8eda6092e59a356b5a4303ce5167e380c2da967fd8d204e80209d80cf6a6ab9888abbacb79b7e189a120f4ec64c6f6214cf997ad22a96b1fc7c38e3b233d4e05b4cfd1cbe908975b04654871be742e24b114bb5adb962198f76c73047b769bef8288852c35d99defbe8fafdbf367b92c16d11e473a07f050d76a678251975ca877519e97c2f713342b92c08d4fb0e0a08de5f9620b53cdeceb74a48603f4750ebcccc26cec34661da0672b32e1cdd185d1ae5b615609726f0de01f360396da0a06950a2a17c07a45bc38529678883eff0a248c5d3f5a52c5263181c4ae489580fa53d5ce9e2671bc53c8c2753f64346e443a19c604de35747937885b58d92d1b9e19e0cf609bd9995b899223c4a7bf3456a835aa5a92cddfccd0f2a95c530ff42469a83f40044bb5be2f0396b00b365fea89c4840dfe3ed3aec15608dfef4940bf137f8ca6e15f140a7a2cbad5ccce6c5df39eec3e4764fea76659100f0302e83a7436a32d324bf8acc3b1e1d2036aad99feb270b6e57b76e3ef48b55405937a8eccd03726e49d101f34df7258734087276607c1be5cff9a4ba4db47c00ee8515dd6c61b3163f4afbe807bb9aecf984a4fe06b69da8fa7d1981b79d7a1ac3f3adb16b5148fa4b74850ebdca1b1faa049b9ac8fc3c0de6665b456f077a55998081ca25edfb2f8ca45f59f1041e7f1d04172fe5f26d21d7f78fb55dfb83da878035924dc8f9597d98f1beaf96458f7e47f6c929697b97c9242c990b3eae19b995bc73aae547bf5d1f6156b61f574195dbecdc4aa7bde7e835bd7fa1f95aca0a307be39d07f1046ca941f4e9122b15c3d0b2bf2835aaeb3d169130482156c5aea5d36be86748663b2cf41bb24ba87e283d5b2d0e40f75222a4e0274c0b8887dabf34954ba3c28986f2ca7e8cbbd8c4a36e0642669f2d0820464e39d7002bfa6890546f931f0ca45b803ff942699bbfe339966192191b152fcec0c3184e7304aaf2ac2c51c9143786f565147e77d4f5ad8560be95dff1c80059eb2c86e3e490e93179b484452bad40291f874d43038860a15ee06146a3380d5b5baaa2514466d008d1e355b4b6b383b2fe02698b1761f2e59b1b486228907f6e77f2b110d0b3301fb0466ccae5833c25e8b2c373c63209aa3705387ddbedebb0837a720004e099a480293834892402ad714aa6f4f09e11ee741c80fe54d55bb43db97a9f9fbee67db150cc1f3e6885d3cf2a52856cd2b8f41057c58e11754437fa04464810d87e6b83f5b003413c0d7d87d061b70b3cedd868d1dd8b82a677c0dedfde1ab9cc59ae5f3d3a300e42f960edf005855df8e02d6f8d5e560383f445f6a48b4259cced67e1d9cbc5ed3fd5ba9afce2366faaae849198545c376beff5335a9fd4b72d2d56712ec2074d3a9a024d3923ab6b19985ca8d931a02afba6e5e46d3cc944f10d767fca42145ce283094362663c3e3deb7507d79af35cb0319d33b5a0e4a6db54a096076c915d7405057c34bdcd2f7bb7cbba7842a8d8cce9976b57ba3dc95fb28a755df334ad68914b0a757f918021e5b0d4661ca655611c9263cf4529ce771f4681c1e57957d26e4c73ec50c02e1e05dd47dbba47b6088cb16ddb68009f26677467ba3c0c4d6f95a68eb0239d89a6b46a47ce9d6dea2971cafc28cabc81156c68bc05d9cf8fef50b8b5c7f20a2f7d9d0c6e8773e51c4c598b9136125c4a0c9db39858f5a7bd3eafe961a9f033c1810a4894f01ac3180fe4b5e2e6076bbd4969e319dd3c17e6be5db973c01578995a9b3398d8ceef106d81e83c243a4fa5d3a9edcb3bf83e45867be6de26d6d889272ba3d712e45d298cb043cc5cb1da40e82f98a258a0ae2ae3a696b1b22c74d95460b55e2ce65d5a5dcdf0310317a25d19ac317f3ebe6e5619f6091fb89bbdc62a01116bd6a3966cbac3edf5acc7c3f8502ab7942a1ad25ad8141a95cd5b5c8bc15cbb62c9240d0ad741e53f25fd20745e3eb623b3a69fcaf32e7564304e2e33a9d19f7a9f3818fa381f182101b1287e234a34947f022792ecd7e314a21cba5b9304e0853d042ea4eba48d72306792c816fb4f5d3aa7b14da11f28b5e3bc7e2e0200ad0a5ee6061c0276aaeea7f1000c3fec8d3e45f35bff258d6c86449e13a7aa22d1b4f769bfbe5d7e3b9952dbcf44f309fb71d209dd320ace6ed941a997478500187b2992fcc13acb728b6a6830a5768e0c7da3d7d19dfe464b40af932084ef6dc130f6b4d8191ad8d9f15187e4a106aad1e420343398f45f1b2a55af83bbf675550ab1dee969fdfeda765b82dfafd4a180dcaeebff79efc307505ce80501e3c6318e2e1d77828b7548d035b10137e061f3c2cf5b82820fddbe19fdf32d9c2c29f82f665c7e6cb38b99cc1e6e188ee53446fc6dd4e6808b83298ea092314964d41f9ab0255789ae7f3ab25acceb317ad985a26ab75c001237187ac2f095b1cef3432a17825db9da528d031de45ba595776768476b3375b2a9055a12457ba7c0aa345cdbb3dd8571f08994500020281313ded78dc6f8af0e1534038c5c0a4de2ff7883e4b825298c955fa5ec9ef4a3e439997070d04f3b71232c1c7b9d29b1afbe23fc9766efe182b42931481a506aedd2869f6c0d9a9677d34c9a06c9203e3d3a42aab21044a119dd9c3f64a4545664e4419003ef236fe5e3dd004d340b06db777892c00b148c2a339064013629ee317b68892fdd485a282227fafda98b569896c01fa82db5df50000ec2319f5047485da937edd4b39762bdaa5167dc344290f79f1d9f0341a0437979d555638a82741b6849b58380309dc914070db657ad8e353c4fc678c13342f8773e77e365f4ef8417f7d0b74c51e74fb7bd524c17047635f107a15f656b95cbca060c3ac39ef2f43eb35e0245ca5c54052cb10b5cb32df4981bdbbb6ae4539b87646a1e252148315cb22a9605c649b44a42616accf6a49244f75776ed52b21b12d40d7ca9689e3dfc68f0f266156eee3a6dcf5bc2fb8cbe877d082bcbf715b26d9e75d50e134839ac15b38f424e6f88b6dde9fbecda577d5f6a2300b15e3a576e47697dd98195e7f51c6a92a913d375743ff722ba185bf2ab5e3d08f6623302137881e14b92006a7ae154dcc6aa3f6b2a6471b45a47bd9e675b15d63eb0963d3306d4478b08e410d34e099f7d31644ac9d5be5a646d48a5aa97672c060ba6e59a49b90fee380f82f80cab48fad11101117431a57f911ee8b37d544e2300dc801cd52c6bdbfc39bd315edb87dff1efbe596b993d842873118fefd9b68bf44996065ff99d3dd68cb29602d238bc7d1b6c154a5500d0f3148b5b7434884fdf19d6b86827bd10626d0bfb8c638aeca0fbb776251989236a13d399d81bcd78d706f8838b6eef84d50e6b96154301dada0d4ab6f9fa8023f013c0bc91cdd8b9cfe3cf2ea27cdd9fd114f0eecf3b733b23816773eae5922f8840b9e48c835a732bc7fca6bd5a488da8ebe191186cd89f6e36809c1941a22089cd43142cf1987ee087dbab8f09c60bbf2bfe2f6b4a39452394733d813adf4e66805ca3935a1d2ba765f5aecb0ce74896e8b02fda74af872f2dcde097f3446586cecfa2a13960284ad11fc3431482ecc8eec81fa15207e686bd87d284b261ae6bf4d9dbd0621c28236a6894aecf23c0f843dc5a457359e729be5e9e1316514bcb0cc9025d7a946cff7593aa8d2dbaf5bf772b832b2b81da372ed0940bb43ec286975f139cebc8f6816bc5be835fdc28155e5286f7db6198d42b0c253596caa3b1caa78772d0aee52e7594ae201820a16b216f73e728d39f02832e128f0d48d4436358e8454629c5ee3f943b81668ffbcec53d22d47fe96fe119016a76191c431967725e994438cfb420a41e12ef4fb669c27959c8bc34e7ee683eb9948af5a0623c8a69526bfc97807b03bba7ff1461e34e76790e250330fe1cd934a5eec600a488940f6de26b12bb31414662793ed666f048b0f67dff0b68b5fb8434f86fc9a9665623357791b87cc3f18ea6cb3d6a927cc727e470df4e8c6d333e52093491099dee73c17279658e0f58a7572204895a4d04d5ada675657d008708dc32ad4b13a72ba9d77a4e81b7b74ba6c0768f3bfb44c8beef24cbbae540c53057c1e4059b26ee4160ae6756e26b326b1ed3d3a12f6460a95aaa8d2c019b8bdf0421e813b6f77de4a87077b2b8d83c96394d1eaa424f5fe44ccf33cac0a5b5b9550a89f90ea15f153ea2f7c176d99d8cd8669ef25285fd87a29b1f12dcffd79e19921240c9297f0b26a07503cbbd97e135722ac6b4532b5aa5c5a71f19e7efeda1392e9ca19d3302fc68982ff7fbc3978fee7b6eeb851aad7c4581d9483cce5a87049ac7a3a90575a28ffcdf9244608b8efa032ef5a895c16e6fbcb44cf00172c98619a4ebee205b81019c86b3811cfe4a3952ca7abacdc8e871faa8935ceff09b9c888b572aefa50f0ecfbf369dc3cb1c5e1f753adcc7ccfbde61d43f3e8acf582124fb2fd41f99200b4cef244dd474ff7b81dc49778133b5ba959014400a4582701e9faef967be24ee168da19445180cbf16a88be27aa90f294aafe1886c474a770fa442a163fcd015c6b4368664391932329f58602856f09f3acced82fed223a3094fbcf90c6f5851804e8771aef7b639347e62399c6733fa3f7887facf26ee7e476e2a0d3b70a0cf8a955eae2371533035fd62dfbf0881e5d87a48f96539b0ac3194d55de4b4f2b41536faec5ae14ad7bb038a1d03cd32d677ea48d1fef515839b666b8011e82d6b063c3050aca871dde7fdf361672e8085329ba28db6c2ec1039f6520fca3aab5383b6dad4a2526ad972ee7ca0dbe6230e1937753221f8c38c28c9db90fffc438c97de9730cd309a958bb677f6fb030a005ad95c588b267e330d8b7a37eb43a52f1f239f6de8616887f979edb2cf15649953948d299c214bb90a2a50b78b52245dab01672c2e2dbedab20be90a6052209bcfabf5fbb7bbfafd37cec646a2890558f61c371fee1da5f64439b41ca3661ae67d81e91350b2199f4cea76df1d44d7abacf850c39008730c2989be8af18840d4994b3b1467787bdd2a449ec2f5fdaa79a64e53e6863ea04e9e841ad3e5874f11c6f235d18a74745d17842d09292a6ea7d942a7dfb23468404a50b996dab7add58a20241f", 0x1000}, {&(0x7f0000000600)="a07a899a2663649619b42a96652446b0687f257c6dbd467f2d2dcbf2a92e295605a1169882167e751feeac7cd6bdaff2c6ba1d7171526e6b0041e4ce99a396b7b33a76a597517d05a6870d5b7957d55fd0fd88454700d3b4a0d7b37f8f5e83fef01351a4dd58de2333598a3151f4b9806b2f4406178387308532eb40f1fb864fe2d5e2df08a4815e6d8af3f8c970b6377bda8045477a58439ae80b5d4165708dc496f2331cdac75531731f152e2c5d712f48d8cdf1882c6e215a8d80bd0bdb7f83b16b2b2186c19d0688cfd19f4d81aaae7d82a4c619e69de54593d152b8a9e1aa9e", 0xe2}, {&(0x7f0000000240)="433dd8cf5f4e63e3c941ada8dc79bdca705c24ae1f613c7606a0b2afae", 0x1d}], 0x4, &(0x7f0000001d80)=ANY=[@ANYBLOB="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"], 0xa8}, 0x4000000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000400)="e8cc6d9eb6f870e482c294a5dfbc8aedc779cdf9530e04712c84d114bb17c5474122099049af82e1d1246c5ad23393a8b058ec60f9f6d1bf4d7bb0f3aab4816130c074b7830eedfe126f5bfabf2b95aa60276ab170afaa38dbf788e3393d91963e", 0x61}, {0x0}], 0x2, &(0x7f00000008c0)=[{0xe0, 0x0, 0x0, "c998178db52d0107dd25554331cfca30bfe58e19a0a48dd02e21cfe316781ee4f4704e9829b5b6378f2871ca81a3d9dbb2d82a20f9b42f608699bc91da679fd35fbbbdffac033977d6cdb883779146dd95de5db78958251b7d290bda2bfb9362a1465d699dac3dcb3b01e3e94a691625711d11a90592122af014d2eb283f4669cf7e0fd0229a280d8beb5b7eae1c2ebd174f1d58fb303f4630c496cee6cc89d273477b08cac5cc969ca15940dfa5e7fba158f1145b71cb5af0780237a594a42c799ca6232f059deb4a84dbcf34"}, {0xe0, 0x112, 0x1, "137b9cefc8c9c6077574ac0788ed50e47194fb66bf62adabe26e14a29abc5343d053736e74d92904787cb605d024854867f2fa6c66acdc3dd9d6f2d1df561665e8d5bbecfb0809063c7ef757b20c4e77a88236730646f4167e6b46397a9c33d7a8c8c5770c163596c2fadca1685407b59f5634d8d3a273ebf2bfc8fa89b26c71355ae9bb65d592cef8ee3caf39c24de7e2c1f8958301a9f5add528e5fb5bb572b9ee08c6c3835c400070b0d39cd3d90a1f75fe399a3fc907fa6a9d9d8e8a0cc249eccf5cdf4c243a12031142"}, {0xf8, 0x104, 0x4, "49c185204497d62d1d0753ef7a546e5972d9e1a4d75e1d60d6fdf648355ea7a52ddc1d6912a3a67408ab18a40437f343fd6fcef6908cfa06afa363628b108f758f2d69ee4ac1122fb3f06869d4ac431886ccfc246ffa0b0f3ea80a0858d341764aa2bf46c6e6947e1b31717961df437038a324d2b7c5826b601640072e97e45350f3b89fe352e6c3fdb174b042088450ae7a92d1560fd29129e804aad0a39d615a67668c2b9b87f76ea8592c2662f9a286896310a4bc6bd74a9627ec9178e3d6a01371d2caee8763e2479c12227e2f3f92835d4ca887a1b85b6276f365de947b07d4d1464e46b1"}], 0x2b8}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x89, 0x0, 0xfd, 0x4, 0x0, 0x1, 0x5000, 0x5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x1, @perf_config_ext={0x0, 0x9c}, 0xa0, 0x3, 0xffffffff, 0x9, 0x3, 0x3, 0x9d34, 0x0, 0x8000, 0x0, 0x180000}, 0x0, 0x8, 0xffffffffffffffff, 0x1) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x11d8, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002a000000e8bd6e0eb80314000e000100240248ff050005001200", 0x2e}], 0x1, 0x0, 0x0, 0xfcffffff}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4008084) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000880)={r2}) sendmsg$kcm(r3, &(0x7f0000004340)={0x0, 0x0, &(0x7f0000003fc0)=[{&(0x7f0000000b80)="35295d16b83ffd03dd0a9050986247758b2b15c35e22ae710a52e1997765fcf71a7cbf855141a45b7057e391450c52db01fd30877c85", 0x36}, {&(0x7f0000001bc0)="5b351a092ef9", 0x6}, {&(0x7f0000001c00)="1dc0d62a8a3e91a9ce519257b69a3d8adc3ce3f60b20a22cd464151807904d748ac650b4aca0f5e92b652418739272fe803926c192d83660b3114148e55c5edb356cf81e4748ea7081596ff4ac6db46a5bc72984951cfada9d2fc392d76be77d3e65988bebda60db1f5b835f98e8576c87777e33ee652a10", 0x78}, {&(0x7f0000001c80)="05e31a852f35faca2e3cd8a9833b177221979e473d2539b841128593eb353fe8acbdb725f55867d1a3419d161bc71bf7f4b12d0f07da5f85b870dc2461125ad35f9bd9e2cac70bb0aace0ee72fcd23d0ccd970bb95078c95c8314bca7376b260090642bd17c3bb8f6efe052cf7aaaa0aa32bf73a3b1b50d44ebcbdd81fbb8260a2a2ad", 0x83}, {&(0x7f0000003ec0)="0a6f389c586ce034fce5a24338866bda86a53144d926f317750413aa9fbf84e0c4f1976a2771d8ff47e11e503f7fc6b32071f93f38a8d07778049d31ccbc4552b6a42c18758431c6336375a75032dc23e6aa8111916f68cf3a6af062d8e6db0c68b6cdd0464330c3bf6d38dd2c4ce9b42189dccaaa57e649b3a9663ff57ca7caee6f44a87c4937f007ecbbe4f06b7b6c00c1c9bbb8245bb14cba8af7cddbd2390e062f6b921f2da86bb7620aedc5bd7ba5d5cea932daa72894ddc138079630978f103856c8", 0xc5}, {&(0x7f0000001d40)="fa", 0x1}], 0x6, &(0x7f0000004040)=[{0xd8, 0x0, 0x5, "fedb774b7bc0b08b937449475aa259a59970b8a7abb97fb97c092d2fdbff4e5bb39a8dc5c55b31ccf68d36adf813929f45ca531a713a818993055e40b1c9a79042e0dc47a106e6d97962e48292c6a23521e4b743b0d84b8835cad4473fe79f087479537277acde166bbb3e4c05611555af8f8c62bc84577832c9edcdce3b6aa41fd0ba4cd0625d931bc8509dfa1134bfa23a3dba6191218aa063c217f05ec1ed72721794d9d874c92ba0d6b005d5357cbf93834b6ecc1df8b1f4fde0f0b0011cdeddfc"}, {0x78, 0x11, 0x3, "1e0912a529a6b5214167f8ac38379a62939b4b666dbd5d6cfe8fcef16b03221330c1a80a0ef903acf376a990741ea816c3fe9d80d9f50384fff50d0c13f2d150ef2b0d6d82178fbe9c574ed3d09982009bb5de3885a5f790577636de726194017e40eb71cf"}, {0x98, 0xff, 0xffffff52, "6ec4a7dcadedd0d55a6b5ecd6af15c97b67872aeff186ddf56940f6970175af8eeff945a6aa4b9df8e454c8e90d6ade5a5356c24fd7d1bd8d550a6d78e20531ed32ecf4b0ec25f270480a98ff83d06d8c211ff05b63273a5961a87a2d6422c550de69551b3be753cc0492444870987c9e95f4b715f76f828b348f154f721fe156e248f0a"}, {0xe0, 0x116, 0x3ff, "76a010a330aca6f7224a20f08792e6309a820ef8e01f11a440de8744a0503063e28e96307ccba5dcbb1bdb1f24abeffb6b00f058adac12326b26373e0d185a6c7ae6b7c9fdef40e4e6788880f3931aaae432c93363494894252aa50aa8892f0747fe662e11aff26263fb9ced0669cf2873c519f8f6867ef215f60c95f8a66b064c057da8d6bfdf57ba1743e48d5926209691efbd29c0c8f973cade57c31371ff925eb83c062323735b97727c698f24089940c332e958afe8ce638754cfa2b3f3649d81e9bc4844e8ba"}], 0x2c8}, 0x4000882) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000340)=@sco, 0x80, &(0x7f0000000580)=[{&(0x7f00000007c0)}, {&(0x7f0000003700)}], 0x2, &(0x7f0000001c80)=ANY=[@ANYBLOB], 0xe8}, 0x10) 08:46:42 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:42 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000400)={0x3, 0x80, 0x8, 0xff, 0x24, 0xbe, 0x0, 0x0, 0x10200, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x24, 0x1, @perf_bp={&(0x7f00000003c0), 0x5}, 0x0, 0x7, 0x1000, 0x9, 0x3, 0x1, 0x6, 0x0, 0x0, 0x0, 0x800}, r3, 0x6, r1, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfb, 0xea, 0x0, 0x5, 0x0, 0x4, 0x3321, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000002c0), 0xa}, 0x8000, 0x5, 0x9, 0x9, 0x7f, 0x2, 0xfffa, 0x0, 0x80000001, 0x0, 0xffffffffffffffa3}, 0xffffffffffffffff, 0x8, r4, 0x9) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) close(r5) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)=0x7e, 0x12) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:42 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) r4 = openat$cgroup(r2, &(0x7f00000001c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) close(r3) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e371048038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:42 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x382, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:42 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xa, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x7, 0x10000001}, 0x0, 0x0, &(0x7f0000000900)={0x0, 0x10, 0x1, 0xffffff16}, &(0x7f0000000340)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0xffffffffffffffff}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001c00)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000a40)=ANY=[@ANYBLOB="180000000600000000000000020000008c7552"], &(0x7f0000000a80)='GPL\x00', 0x100, 0x9d, &(0x7f0000000ac0)=""/157, 0x40f00, 0x5ca9cf73db55c1d8, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000001b80)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000001bc0)={0x0, 0x10, 0x1000, 0x8000}, 0x10, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x16, 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000001, 0x4}, 0x8, 0x10, 0x0, 0x0, r4}, 0x78) gettid() [ 1780.547217][T28700] batman_adv: The newly added mac address (24:02:48:ff:05:00) already exists on: batadv_slave_0 [ 1780.589244][T28700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1780.612380][T28700] batman_adv: The newly added mac address (24:02:48:ff:05:00) already exists on: batadv_slave_0 [ 1780.680503][T28700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1780.729159][T28700] device batadv_slave_0 entered promiscuous mode [ 1780.760982][T28704] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1780.775811][T28704] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1780.835687][T28704] netlink: 178192 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1780.878061][T28702] batman_adv: The newly added mac address (24:02:48:ff:05:00) already exists on: batadv_slave_0 [ 1780.909436][T28702] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1780.941604][T28702] batman_adv: The newly added mac address (24:02:48:ff:05:00) already exists on: batadv_slave_0 [ 1780.968603][T28702] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1781.467367][T28704] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1781.502573][T28704] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1781.522102][T28704] netlink: 178192 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:44 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3e, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:44 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:44 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x383, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:44 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0xaf, &(0x7f0000000240), 0x0, &(0x7f00000006c0)=""/100, 0x69}, 0x40030120) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000540), 0x2bf70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000004c0)=r2, 0x4) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000600)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8a87ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:44 executing program 3: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'veth1_macvtap\x00'}) 08:46:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e371148038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1781.776403][T28741] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1781.819639][T28741] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1781.882507][T28741] netlink: 178188 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:44 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x384, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:44 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x65, 0x1, 0xfc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000101, 0x0, 0x0, 0x6180}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000140)=@phonet={0x23, 0xbd, 0x7, 0x8}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000000080)="9d422ad4861376356d5d5a6641413bff07000000000062ca7680db54dcbc5467eb6600000000833b56a39700"/54, 0x36}, {&(0x7f0000000300)="810ad25c2de93b12f3eeb5b050979d241234b294f07b4390db133bbe7bd02649b66db4fbf3780038e7a16e20ff10f50e1b3bfeee17e784a2c41b324673a9e9ecb2792835fa049175102311ba42d3286fe5e3b5222d4fc4562519658561237d1e998b37a39148547c46a52dd113c4e0b6e5ea6da79b16a5145cb9c7d302c65e5ac6c13a2f4e966f27f000b5836a131101b046aa46d1d12375847daf4f47a94700595c54a7cfeff708f88a0569d7786b7a7a3ec52b5d3e277fc44cafec3e64f499c966c8761cd1e7d83627ba62f5728d60b0403a40ed0fd61c069d6a1233047183a367ab", 0xffffffffffffff77}, {&(0x7f0000000480)="ac5ed31dbf2d4d8a70355844ed7c934a6266296feb273b5af621fc6c59e85dfd49ca305d15799016ee00a635e769", 0x2e}, {&(0x7f0000000400)="22afebffe6dc8dc2071134bd0856e7f881c171885b2f6395a262ffe07aad307f6f213c912b66c00ba89bbe78be13c489c294248076f86c3814e5ab9795", 0x3d}, {&(0x7f0000001a00)="c1ba1bd519bf08a56fe6874a39a9a997d80d51112d960e089279da5d7d7025ae595a979c1ff56298417d5ed553a6cb5b44c72edfafacdb86eb3e5c778a95bbf828641b1be87ec22263e7215f745b356b8d219d43d0fe4ae013aaee1fd21e975f9ca49666b54fc76e0863555c222918e62d006feef09fec8a04cfd0bb4607501a237f1ec5b6abfb0c79f8a970fc28ad353352ee6cbfd7d0b96a578e21b6821c80095558734c68a5", 0xa7}, {&(0x7f0000001ac0)="b46a6f05768f2518e6ec8eff036cf7fedd126a14af91814f4681f2afd816924a2bd9847d865a240c37da71d4", 0x2c}, {&(0x7f0000001b00)="affd77749acc191a7370e705da020ac7979d46ec02af21dcd661d6835d2e37af4bed043266db959d6504e4b4626a127ac25029d3d4b408e757735db2817bc948cd7b8c9e2b7132bcf9cdbab4cf3aa177e3583112716b9ea400e77ffa3c1ae0a0459148a0e057b72fcd38a0a8f6bf5a1ae87b2ab05a", 0x75}], 0x7}, 0x4024804) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000200)='wlan3\x00\x1b\x1a\xec\xb5~BF\xc6\x00\xb9\xe1p\'\xeeC\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde9&\xdcU\xb8\xe5\x90y\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00l\xaad\x1a\xa0') socket$kcm(0x10, 0x2, 0x0) socketpair(0x8, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000500)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x81}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000680)="a3fac3444167e1cadab48d11b83a8421bcd3f4276e1a80bb31960851073ed52473c4083bbe6648355526dbe627e547dd7f3800a6c24820bafc3db6c77ec8fd9bb384fed7cff71e6543c4f7d1fe46f36a96a22333aa61fd0bcfd7ab23ce5b8a6881fbc9c76314df1a5dd33724a7fac4e3e97498ae28fcb1ac366383c7410d0f70613803555fb00942dd29d5c060383e9d6e6f573a42ad3da4ab2b56dd36c712a5368b4f5ca0ab8f012bcebacae1e8880907f670938ac3dfc307c4958d1a0dd5b47216a18698415492", 0xc8}], 0x1}, 0x4) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x81, 0x6, 0x40, 0x0, 0x0, 0x5, 0x5c435, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x40c, 0xf4, 0xffffffff, 0x7, 0x7ffffffe, 0x8, 0x9d}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x5) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1000, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) gettid() r2 = socket$kcm(0x10, 0x2, 0x4) socketpair(0x1d, 0x2, 0x7, &(0x7f0000000000)) socketpair(0x2b, 0x6, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000001b80)={&(0x7f0000001940)=@caif=@rfm={0x25, 0x9, "0c6f575cbb93d855a4eb526b8cf6df93"}, 0x80, &(0x7f00000019c0), 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="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"], 0x2e0}, 0xc004) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b3f007f03e3f700000000000000ca1b4e0906a6bd7c493872f74a375ed08a56331dbf64705465ce960169381ad6e747033a0093ba446b9bbc7a0600000000", 0x4c}], 0x1}, 0x0) r4 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 08:46:44 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r0}, 0x8) openat$cgroup_ro(r2, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r0, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e373548038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:44 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x15000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffeffffe}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r3 = openat$cgroup_ro(r2, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x7, 0x3, 0x20, 0x6, 0x0, 0x3, 0x20400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x1, 0x2}, 0x5825b, 0xfff, 0x7, 0x6, 0x805, 0x1000, 0x1, 0x0, 0xc0f3, 0x0, 0x81}, 0x0, 0x10, r0, 0x2) r4 = openat$cgroup_ro(r3, &(0x7f00000001c0)='pids.events\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x40000d) close(r5) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r6}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x3, 0x0, 0x0, 0x0, &(0x7f00000004c0)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000400)={0x4, 0x3, 0x7, 0x100001b}, &(0x7f00000003c0)=0x1f, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x8}}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() [ 1782.467073][T28767] netlink: 178152 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:45 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x385, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:46 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x42, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:46 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x81, 0x5, 0x7, 0x0, 0x10000, 0x4000, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0xe1, 0x2, 0x8, 0x2, 0x3e, 0xfff, 0x81, 0x0, 0x0, 0x0, 0x401}, r0, 0x5, 0xffffffffffffffff, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='c{v\x15n\xc2\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) r3 = openat$cgroup(r1, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x80, 0x5, 0x0, 0x3, 0x7f, 0x0, 0x9, 0x10, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x7ff, 0x8}, 0x0, 0x0, 0x4, 0x6, 0x800, 0x6, 0x1, 0x0, 0x4, 0x0, 0x845}, r3, 0xf, 0xffffffffffffffff, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) r6 = socket$kcm(0x29, 0x1, 0x0) sendmsg$kcm(r6, &(0x7f00000017c0)={&(0x7f00000016c0)=@generic={0x1f, "2e3a27756860762b9a5c6f7e841e63b85d67948b9639e58f6a42479dc49b68a14ce44e52b67caecc70a3fb56a586d61717f429b60200a585b91c85eaebc9a8c6a2630cda93a7e49cab4b28cefc4ec49b2bc8d8c04bca416cf4597a237b14301d40f43886d1c4115d594a2a158e32fa85e06f69b19df804bfa08aac2f1e19"}, 0x80, &(0x7f0000001780)=[{&(0x7f0000000600)="4ca52705f4b4db1c3f7023971f828dcec01ce7c2a74c411ffe18447cb595a6d72e05b5a89dafb098ab3841cc", 0x2c}, {&(0x7f0000001740)="67719b5b2eb7871edcfb9f8e5eebb91fcfe6ef040041fb99a4f787c91135973586dd5e42d39e87dbbe7c", 0x2a}], 0x2}, 0x2000800c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000180)=0x23) 08:46:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e375a48038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:46 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:46 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = gettid() perf_event_open(&(0x7f0000002a80)={0x0, 0x70, 0xfa, 0x3, 0x7, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x0, 0x80, 0x101, 0x2, 0x0, 0x3, 0x6, 0x8}, r4, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x3f, 0xd9, 0x8, 0x5, 0x0, 0x7fffffff, 0x10, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x401, 0x1, @perf_config_ext={0xff, 0x1}, 0x80, 0xa3, 0x6, 0x9, 0x78cb, 0x21, 0x90, 0x0, 0x3, 0x0, 0x5}, r4, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:46 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f0000000580)="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", 0x165}], 0x1}, 0x40000) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000240)=@hci, 0x80, &(0x7f0000000400)=[{&(0x7f00000002c0)="327339d2e66ad250114f066b912681d9278805d6d857bc069d213f68d045dc9409c4702f68b54123c2d594d6f79350a68699a5fabc557d7ca0596d00482eb179ab3592", 0x43}, {&(0x7f0000000340)="41e569166eed5fe254804b0a9fb656da6d036a154441715a0c60d388d1761f909dc8860cfa7dc4bfba847df1ef543be2ad62edf66c00ff0e2cda7b53174326befa1ba1e2cf1edd4e4326da83e50bb00acb85bd4c2c8034d08a2c103c0d898d9e0eea98bbd64a9387e565d8036b7dd5302b7afe164a7d0caa892b046de18caf89aa531fe7850f1de483d347414792f91dda7a", 0x92}, {&(0x7f0000000480)="b03060b0bc120720f456ed1e97bd1ff8abe65b779e64fbb0d6f2fc74bc74e8ac3a8ff86ca2076609d8db73388d89a3fe085318310224b08b967df313f4dce6672f817309797b9a1a45fe2ba66ec1294ff55e7f28fb552274948f2c5c880ef0bbd264893c9a48b2a89e47977cc6ae4a78aa43b461fcded6f8f3d05c615809474d713063d40d50647c371132b9e8186e6f37b8a1e774786b954537148279e2d65a3e44ebf24906edbfcba0fa9d7446b9e25bd1e9", 0xb3}], 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000000000000f010000e20000003ea92300000000005000000000000000000000ea0600000024ca9382b368c867e6cfa904664e82a58f931f20bced30207414ef44d2400bb00146aff55c1fba221dd9c2e13002277f5add5c95a99a5c9eb32799d500000000"], 0x68}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) socketpair$tipc(0x1e, 0x1adbe3e5cc54e73e, 0x0, &(0x7f0000000180)) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890c, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='freezer.self_freezing\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) [ 1784.159449][T28812] netlink: 178116 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1784.245703][T28817] BPF:Unsupported section found 08:46:47 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x387, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:47 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) recvmsg(r2, &(0x7f0000003980)={&(0x7f00000003c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003900)=[{&(0x7f00000027c0)=""/207, 0xcf}, {&(0x7f0000000600)=""/23, 0x17}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000038c0)=""/61, 0x3d}], 0x4, &(0x7f0000003940)=""/60, 0x3c}, 0x100) sendmsg$inet(r2, &(0x7f0000003b00)={&(0x7f00000001c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000240)="201d81bb0cae360c3c2f144df8c250fdece63f6d5ba88a585857c5921d056cc50d705f829a50ad2aaac55414145156b8260a567760f32bcf950b5923", 0x3c}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f00000002c0)="2ef4a792ee1514b1bb572a7b2260f440a682d209be0afaa58b211102c892579cbe654ceafaa460fb469c3e2cd6a72401c5e39607a58ce55092e39d", 0x3b}, {&(0x7f00000016c0)="938bead077a9b8e9a650a956d8a5b4ab23ea9b11bc9bcf7491566b02f852af159afdd92c0f3bbe73902c7bcf75b297e70afdeda6163364a2a523eceaa99c5e656157b358acd8d1adb98897de8faa2db45ffcf3a7838a86b5b14ec71e06f5eddea2dbb8aa85b96510e62fa26531b24ce652a88f98a7dbe87295575b37fe53193c3d6f15d4c56e20c5cae9ec2b260b2dfba88799907d49ceab6029f549075efbcc446910bb35b66556e5370f0832afe196c03b7e5011c702166eb24c2f767f29f9c34496843fa869596465b17a08996731a61ca65c27be320ec24d5b861c133f592ea60fef8103069b32", 0xe9}, {&(0x7f00000004c0)="7cc3d41f0d76a2b3dc2c8a68c8b117ab93dc42d55fa978c05571da72309901c6a7c757a65b310d3e14125078a4a7f18a09bca036dfcbbd46af0ab5e4cc7b88d2153fb570f7e5bdd06a11474d1e9cb3fb3dab36c0c232ed34b5927a19c706a248270d24b4f0b94284652678d98650c457d708093517994d213719b971ddee4802b7d68fd174acac02f78dd57f89c509d5d34a9518426c0bc0ab55ac35b9a7c01654012383172bcc989b0fa944d01dde641035", 0xb2}, {&(0x7f00000017c0)="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", 0x1000}], 0x6, &(0x7f00000039c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_retopts={{0x48, 0x0, 0x7, {[@timestamp={0x44, 0x14, 0x3c, 0x0, 0x8, [0x9, 0x0, 0x200, 0x0]}, @timestamp_prespec={0x44, 0x24, 0xb5, 0x3, 0x2, [{@local, 0x45a0}, {@private=0xa010100, 0x4}, {@loopback, 0x43}, {@remote, 0x40}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @multicast1}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@timestamp_addr={0x44, 0x44, 0x20, 0x1, 0xe, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0x22}, 0x7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@loopback, 0x3}, {@multicast2, 0xffffffff}, {@multicast1, 0x80000001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}, {@private=0xa010102, 0x7}]}, @ssrr={0x89, 0x13, 0xd6, [@dev={0xac, 0x14, 0x14, 0xf}, @remote, @broadcast, @broadcast]}, @ra={0x94, 0x4}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0x128}, 0x4400c014) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e375b48038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:47 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x0) close(r4) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() [ 1784.626515][T28821] BPF:Unsupported section found [ 1784.751521][T28830] validate_nla: 4 callbacks suppressed [ 1784.751544][T28830] netlink: 'syz-executor.0': attribute type 16 has an invalid length. 08:46:47 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f0000000580)="f4001100002b2c25e994efd18498d66205baa6b850fc2ef72c61c4087f2dc6718754a3f5ffffff020000000000000021000000000000009d91409707d0ba0f10bf1135b683529afa58b6e450a80c4241f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d0700cb745bfb3fc6449d23a5287b7372c4c006b461ee83fbc7533c1ed76d0d930fb267c6b16c4f0dffe2bf8c51ace364a72112ae654a532dc05c7bdbe91d8740fd88c58cc1dc02515332b81764b59a4e77b1bcc927619aff5b740a541cb3e6cbbdea07a9aa8061650445214f1485f3a526d9972f2bf854e36ddff1bb1350a0c5c768eb3b1966cc31655e516e32d3069533976a25e6d03a5bda0114a048b1067075a9cf1d6de3cec7e63d005352820043cc96955d7f3aa598da014b98a0a21f9d4c4898b218560bdb1864d5568b046801730068b5d5377c92130afee5e995f26424b776308d22cd1d53bb1f2f5c8ce018b2e4097c3129e3070b1221fbe48533", 0x165}], 0x1}, 0x40000) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000240)=@hci, 0x80, &(0x7f0000000400)=[{&(0x7f00000002c0)="327339d2e66ad250114f066b912681d9278805d6d857bc069d213f68d045dc9409c4702f68b54123c2d594d6f79350a68699a5fabc557d7ca0596d00482eb179ab3592", 0x43}, {&(0x7f0000000340)="41e569166eed5fe254804b0a9fb656da6d036a154441715a0c60d388d1761f909dc8860cfa7dc4bfba847df1ef543be2ad62edf66c00ff0e2cda7b53174326befa1ba1e2cf1edd4e4326da83e50bb00acb85bd4c2c8034d08a2c103c0d898d9e0eea98bbd64a9387e565d8036b7dd5302b7afe164a7d0caa892b046de18caf89aa531fe7850f1de483d347414792f91dda7a", 0x92}, {&(0x7f0000000480)="b03060b0bc120720f456ed1e97bd1ff8abe65b779e64fbb0d6f2fc74bc74e8ac3a8ff86ca2076609d8db73388d89a3fe085318310224b08b967df313f4dce6672f817309797b9a1a45fe2ba66ec1294ff55e7f28fb552274948f2c5c880ef0bbd264893c9a48b2a89e47977cc6ae4a78aa43b461fcded6f8f3d05c615809474d713063d40d50647c371132b9e8186e6f37b8a1e774786b954537148279e2d65a3e44ebf24906edbfcba0fa9d7446b9e25bd1e9", 0xb3}], 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000000000000f010000e20000003ea92300000000005000000000000000000000ea0600000024ca9382b368c867e6cfa904664e82a58f931f20bced30207414ef44d2400bb00146aff55c1fba221dd9c2e13002277f5add5c95a99a5c9eb32799d500000000"], 0x68}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) socketpair$tipc(0x1e, 0x1adbe3e5cc54e73e, 0x0, &(0x7f0000000180)) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890c, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='freezer.self_freezing\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) [ 1784.960220][T28830] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 08:46:47 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x388, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1785.023884][T28830] netlink: 178116 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1785.135902][T28842] BPF:Unsupported section found 08:46:48 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x43, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:48 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000002a80)={0x0, 0x70, 0xfa, 0x3, 0x7, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x0, 0x80, 0x101, 0x2, 0x0, 0x3, 0x6, 0x8}, 0x0, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x6, 0x7f, 0xff, 0x63, 0x0, 0x3f, 0x40, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80000001, 0x4, @perf_bp={&(0x7f00000002c0), 0x8}, 0x52, 0xfffffffffffff000, 0xffff8000, 0x0, 0x9, 0x7, 0x0, 0x0, 0x8001, 0x0, 0x80000001}, 0x0, 0xe, r2, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) openat$cgroup_ro(r4, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(r5, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0xa, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:48 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) close(r1) r5 = socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg(r5, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x3, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', r6, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x104}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e376c48038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:48 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x389, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:48 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)={r0}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000340)="d800000018008109b3d9912a6bf0e00a80ecdb4cb9140a440aef0b007c02e87c5505000005008eb3d803c77948f30500150007008178a812f910acbf8d6a01e1cbe86c8a4e1e9a2540c0fa2da000050040003cc00200001203ac040012d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95681e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7f", 0xd8}], 0x1}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10, &(0x7f00000002c0)=[{&(0x7f00000000c0)="3feef9706dbb9b65ec4efda84e276966574c0cc8c45a3d41724e0dea8766104e9f461560bfc0fe55efbbff704d1144d693619af36d957b04d062c3c3f387722735b350eeb6e5d9b697fd65a300beef2cff4b7aae280c0f39bf852582928f27311948532ba02fc62fb53b843d673aee8f88dc7108eaecb38de68e16b812a1dba7037e0608f90f62b5e4c4835ce6b2e254c12ff2cda735569852a3c20ee67865c72a4228fe90cc208d03d56b98524b065e30e1af11f61011633d370a42e477d44e423cd0003356a96662a0bac58b0e6ed772b870a5b7db58cf3d078d3aca71150d6f26602bdf038d94c267d600a3bb775b", 0xf0}, {&(0x7f00000001c0)="8dcfaef556cebb131e4c5ded95fc5fa0e793c101c871d1f8dfe77c7376d33fe94733c5e34e7e5c3310457b77773ed6a1b179069b9aa3b2bb490e02d4c50a62e1269f8015cd55aebc379cc544c696af0684f095180519860e7f68fd0e9823b6e127a3a249a7c0ac32e228354c07d57ec741c73fd9549e20dd844ae1c83f35ca15b2c5fa819427bdb86c0e78b45732f4cb146ef9b08058041696de3459e7213255932798637b8d2e9e21b681c26fa5af8f0569161685fac1c551a4bada701432bfe469280fdea8b1179deca111b1e6e01cb4f6206f4ca95396b8baeefa699702f1f7a8de5b84a9fda2d58c3ce156238346", 0xf0}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xf9}}, @ip_retopts={{0x3c, 0x0, 0x7, {[@lsrr={0x83, 0x2b, 0xc1, [@rand_addr=0x64010100, @private=0xa010102, @empty, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}, @ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp_addr={0x44, 0x1c, 0x5b, 0x1, 0xc, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x9}, {@multicast1, 0xfd}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x10000}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_retopts={{0x2c, 0x0, 0x7, {[@generic={0x44, 0x7, "e1478c9c04"}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0xf, 0x85, [@private=0xa010101, @dev={0xac, 0x14, 0x14, 0x28}, @broadcast]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @rand_addr=0x64010100}}}, @ip_ttl={{0x14}}], 0x108}, 0x40) [ 1786.182807][T28874] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1786.261151][T28877] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1786.331541][T28877] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1786.388894][T28877] netlink: 178100 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:49 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x38a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1786.570308][T28878] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.3'. 08:46:49 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:49 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=0xffffffffffffffff, 0x4) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_ext={0x1c, 0x6, &(0x7f00000002c0)=@raw=[@map={0x18, 0x5, 0x1, 0x0, r3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8001}, @jmp={0x5, 0x1, 0xd, 0x8, 0x3, 0xfffffffffffffff8, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x78}], &(0x7f0000000300)='GPL\x00', 0x6, 0x1e, &(0x7f0000000340)=""/30, 0x41000, 0x18, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000400)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0x0, 0x4, 0x5}, 0x10, 0xaea4, r7}, 0x78) gettid() 08:46:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e370242038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:49 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10013}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874588a8ffffff1f00000000122e25d30806", 0x0, 0x403, 0xe00, 0x22d}, 0x28) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)="2e00000010008108040f80ecdb4cb92e0a480e092000000001bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = socket$kcm(0x11, 0x200000000000002, 0x300) sendmsg$inet(r2, 0x0, 0x24004840) recvmsg$kcm(r3, &(0x7f0000001cc0)={&(0x7f0000004e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000080)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x2, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @empty, @remote}}}], 0x20, 0x6c}, 0x0) sendmsg$inet(r1, &(0x7f0000006d80)={&(0x7f00000000c0)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000280)="4f5db562e7d8a0b6bdb76091964271523e5e384f019c1a073d64f4e849bc15ab19bb37d00686f21703ddad06b7774f1cc85ac678318f6293957143fd8c74c6de9f7203bbb817bd97cb87b2d21ea3ed49d94f28ee592bbfa08a471b61f4dd2263a3b7bd3a7bf92069e09e6fada0b1e5dc42a5d3d788ed2175a04da0b74999132e4ed81970c1219929023cd6f35578faadb964d40991d69b809500a38d851c6ceee01eb92cd6a33536041e090161fafd2ee190b6d958e8d89cf66b9c6dd22a276b2c586ac8533ef255d0b1e291dcfb86575b3e9b05b172fb47eae24eac79ca3480f376149f02336f2f6247ef1681fdae185ed07a7459e8d13a134e2a91e838d93a4e59a5f9531b65f2cd203fe132aa532d1aa567071a820fad7071675b2a4e2ae98f9817345647d4e51bb8bb247a5d5b417af6ea5efbdec5af349794acd1b633da37a3202b7bde0a319dbe512e831434702f424cbcde4a6f4af3b7dc1ec20ad06caed5901988e18a0715ef4ff83f0107ea174906ee6e326fad16f88bc5a0e6caa1d447c4b510ca0fe70afad0c933b3a2ac3c30777cc53bf1cb3e05914be2437e5b3f0cc3c00c1f090fc6c200d3d8fdbe2a88f385c65276b543b7701a8246111171f3710c2ef1a0c9e7fe47444811c01b948dab1f833cf53a071b061313a9eb908d588a8fa5c082430ca9e497b89bd4fd91e85da7736a6953e546c9f1c72a79aba9d8172b2e258edfb6d14026a8ae822872c1a422652cc5194e930011dadfcf5800d863a02db6295eb8fb8e1a31fe616beb8c972be2c641af1afb5190e0d6c6b485941d703f1a7179e094659e3d22dd00359e3b9256c2f3d3d1533aaab86c16f884cde4a533947e002c0153497360335c0fcae62591b6a3e9c86c09d898b555ac20a64e190d74604a738ac4fe433def0392fc9bbff644725da4584ef75d3dfa92411e3feb309383d2bd52f0d8afefcf8d58ab68fa1cebccbf9457e223f4b0fa6061e2462d01c072df96e2271eba342bed5317c648951b131669359efe8de224ee696ca61be1a5d51f3c44f2fa698ba39849f12c93207c5b02d80c4c721cd508c3ddb0a28a7d16a09f570350ca53c228a78c398ff08417fe2bd5226daef8d2d6ee54ca2b6d75a41e1ae9007591eed66627b33e7469519fb171499a493b94fb32e15f61a1372d1535711162ea6811de85de12550e91ca27ecab8c2ebff68776fc174f8e4435e57228e5a0f2931bdd63bf44122a34ecc0b5a32c709e69ae73c28b1ceca7e21b7bd88b880580272d52f51097271690ad15ec3a107e0a1e71cff970ca3b361dc63bd54fa4fb63aa7d7b71726ac1846bfcca7a02cdc6742f0f9ab9bf3b3c2d3c8183fe76d3d484a6da63f5b8e577aae8349c332f20f68e6decbea1ffcdc19bdc7c595f2afb20640568314084d12a99e422e11c96a15d42d53ddcad0affd756b5ed9f3f856bc99a0c204a1a93324bd13669dcf4cce357c81ed31064d39a9bfe46bde225e1e5291d66b6bfb8ed6a7bffe9afaa6bde2636ef13893ad966f37f3ecd192ad3e2be1b2d3101d669f9c4cabc0814a196681ab7da53b2928b892eb62a813db75907a27ccc5567a5099e6ed8f3b0a961ab8b7679a0036efbadbcbf1c76ca62a2e9145c27ffb99aadd52d77a984d3c4e1bd87a6835611080418aa952b4487d0c886651aa5e4a95b93acfaa56876c873882ea821f8350e63e9926af637a5299e90497b2fcf19bda36fcd16cf062252cd3827e73f40dd5c3e8fb8a2d88bc6c4f5a9fc7ea2aabb8db02aada492c95c5bd2c1cbbdcf536f5c63a62bd3c6ef6a8515b664ef53f44e1a842dac3b62aa3f51d1d86bfe1ac2abbd01d1447af51591ff37294fd462c67ee6d8083b5127b16146dbd8f63b4b1bc81bf498e4a756d7221bcb547f8a1a6a28ea7d14dd72b0e5acd1ee9585d6bbca689f4dd6df2cd7756c46862a4236c01e08a5a774ba331568461b0655b584ddc5ea7b4d397cf8f2390461264d80c67476ee31f24462d570fe91e01c01545b5df6703a4e96e0b68cd84abb00da172e99086ebe22e689f6bdeb3ad651f7b432f14964db30d190c44934acacaee5b11449138b51ebc6a9d67d206c91e9543475ebcd38c83165fbea0376e83dcea6c4afedbf680bae349f4fc9ef1c74d9e2e30dfcadc82c5caa9a77dfc8e62396a8116fb932feedd8d51895944b5b664f8fb831b6c7235db43eede77790e7c1d4d04f3fd39e688620f7892af2a0fec69b6b596fcaf1346ba57a070913c28dde9f3b03f15caf21304d351db5d2f0bb45fce8ea20e85d3f66c62a1edc49079a99712d1bf0a055d789ea686a1277a8abd5237af7268d893cdbb50c4754ce14ae03fd2c379baefa2ba03b0627e773f123b30b922ca6fc648a776cccab5654aeccab0af0e412778b277111b78fa48049e15f5d974332e6745c2151ae70b8ade76d788dabff57afbe9ecb813a6fff9c3de4560e5a71278de917f94d988369f3f4eace34d368909ceb86d376069272948749ad1f8c2e6a3343d1700fc6de357b0e76ec3c5f47feb2e15624c009a440e056905aacc5503267ef4061d76a3f0ecd3974faf7990be801d085c6cd8255bcee99e3b4f9fcb88e80b0faa715d99a62b5b964f46f98e9fb19857ee495521f99d2701d609f6bf9d345cc0c84d67808e3a53c76d0fb60d73e153677c4937265818789586c72dd2c36b34c13d95a2fe25f2709a7e3ff724e59ec0b6f15e3f15d6f06305a89dbf36782b6761520391fae7ebe960cee088b1c4711254e078c493e5b3b0180ba4190c79fdddf2b7548f0e3671aed90688a9fcd0351ee1903950be18620f30374ce432fdc1c9a39ec05fd326238a19e0aa48e20e69e7c1b093db06df36784d407cf882fc6860c25d46956", 0x7fc}], 0x1, &(0x7f0000001300)=ANY=[@ANYBLOB="1c002b08000000000600ffff00000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="ac141426ac1414aa006d622138880000001400000000000000000000000200000080000000000000001400000000000000000010000100000003494607aab6e27d37000000000000000000000007000000890be9e0000001ac141cbb00000000001c00000000000000000000080000001062394390b943fd742ff2c407edfa133c762e16d7d64268e9e2fb8c6275b6bc9656e312a42b269cc89c025b00", @ANYRES32=r4, @ANYBLOB="e0000001ac1414aa00000000b80000439e0d8e000000000007000000442ce481ac1414bb00000005ac1414bb00000001ac1e0101000007ff0100940400009404113705f04b5bb0a2504b1694aad33564010ae3ec27b5b895572c0010778022ded9ea63d12a9845031d18000206066d4b8357060429a90007d536f645f2000f0c24c811750d03e6"], 0x1c0}, 0x24000080) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000015c0), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001680)={0x18, 0x4, &(0x7f0000001480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x1f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4}]}, &(0x7f00000014c0)='GPL\x00', 0x7fffffff, 0xb4, &(0x7f0000001500)=""/180, 0x1f00, 0xc, '\x00', r4, 0x0, r5, 0x8, &(0x7f0000001600)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000001640)={0x5, 0xd, 0x5, 0x7f}, 0x10}, 0x78) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xf, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="180000007f0000000000000001000080182000009f00000000000000010000009500000000210000"], &(0x7f00000000c0)='GPL\x00', 0x2, 0x4, &(0x7f0000000180)=""/4, 0x41000, 0x3, '\x00', r4, 0x15, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x3}, 0x10, 0x0, r6}, 0x78) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x1}}, 0x80, 0x0, 0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="b800000000000000080100000a000000d1c2cafdbf4d7860332d27610100047fd2fc4c0a976f34e4ff29fbdfcd10d45314d665c747200e6bbbd45e5ab286686be0196259f9f64c326078f8d0d40fc8a27510ecb7630efb9dc91c28d3d0792cff3f49f2a365ed9f29dc2ca6fd2462ec094b7f2f8ab32ea403f5c076c8a3a4e4b124621001d4adad96a2978ec66579b81a8b26e7b2d1ef147c78318d19a703053e4589f9c2783b2168db5b2e88e7335be57c93410da2cc200a10ff0000000000000c010000020000008ca027d6"], 0x3b8}, 0x4000880) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x508, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x0) [ 1786.938730][ T55] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 08:46:49 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x38b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1787.723309][T28901] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1787.751240][T28901] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1787.789498][T28901] netlink: 179740 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:50 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x44, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:50 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x80, 0x5, 0x4, 0x8, 0x0, 0x42, 0xae40, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x67af8d3f, 0x80000001}, 0x4402, 0x2, 0x9, 0x5, 0x9, 0x8, 0x5, 0x0, 0xae, 0x0, 0x6}, 0xffffffffffffffff, 0x1, r0, 0x7) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r1, 0x0, 0x1aa, &(0x7f0000000940)='\x00\x00\x00\x00\x00\x00\xd1\x83\x93o\xb5\x97t\xfe\x7faf\xb8\x9e\x1b\xc4R\x9es\x82\xcf\xb8\x01\x8b\xa1\xd4\x9e\xda\x05\x0eq&\xbb\xc5\x84\xacr\xd5K\x8d\xfb\x06\xe8x\xb7\x7f\x1dP\x14\xc1\xfb\x02b\xa4?\xff/\xe7\xc1\x82\xfb\xd6\x8d0e\x7f\xb2\x1d9\x8bleY\x18\xce\x19Bb\xc5E8\x15#\x18*\xdd\x10\xa9\xbf\xf5\x10\x8a!o\xa47K|mX\xdbj)\xcc\xd3+F:\xf5\x06:+\xc1\xa2\x1e:\xc3\x93\xbb\x83\b\x8e\x03\x1dJ;q\x83[\x1b\\\xdb\xdc\xb7\x89\xb7\xdf#\xde\xfd!\xf0z\x890x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x38c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:50 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000013fc0)={&(0x7f0000013c00)=@can={0x1d, 0x0}, 0x80, 0x0, 0x0, &(0x7f0000013ec0)=""/246, 0xf6}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=0xffffffffffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xa, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x7, 0x10000001}, 0x0, 0x0, &(0x7f0000000900)={0x0, 0x10, 0x1, 0xffffff16}, &(0x7f0000000340)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0xffffffffffffffff}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001c00)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000a40)=ANY=[@ANYBLOB="180000000600000000000000020000008c7552"], &(0x7f0000000a80)='GPL\x00', 0x100, 0x9d, &(0x7f0000000ac0)=""/157, 0x40f00, 0x5ca9cf73db55c1d8, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000001b80)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000001bc0)={0x0, 0x10, 0x1000, 0x8000}, 0x10, r4}, 0x78) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x2, &(0x7f0000000300)=@raw=[@jmp={0x5, 0x0, 0x7, 0x1, 0x3, 0xfffffffffffffffc, 0x4}, @exit], &(0x7f0000000340)='syzkaller\x00', 0x1c, 0x0, 0x0, 0x41100, 0xe, '\x00', r2, 0x0, r1, 0x8, &(0x7f00000003c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x10, 0x10001}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1b, 0x1, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0xb, 0x4, 0x2, 0x4, 0x1}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x7, &(0x7f0000000180)=""/7, 0x41100, 0x4, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000280)={0x7, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x1, 0x3f, 0x20}, 0x10, r4, r5}, 0x78) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0xfeffffff00000000, 0x43400) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit={0x95, 0x0, 0x1200}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0xe, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1788.519663][T28940] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1788.577704][T28940] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1788.667158][T28940] netlink: 179484 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:51 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a98217d4a2483cf9c712385cff50a2b13fc83a45da6d29952a9cab82102008049128c1f644a473cbf2829ff716c50624a6c430bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e37025a038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:46:51 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x38d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:51 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0xc}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) openat$cgroup_ro(r3, &(0x7f00000002c0)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x40000d) close(r4) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:51 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000013fc0)={&(0x7f0000013c00)=@can={0x1d, 0x0}, 0x80, 0x0, 0x0, &(0x7f0000013ec0)=""/246, 0xf6}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=0xffffffffffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xa, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x7, 0x10000001}, 0x0, 0x0, &(0x7f0000000900)={0x0, 0x10, 0x1, 0xffffff16}, &(0x7f0000000340)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0xffffffffffffffff}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001c00)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000a40)=ANY=[@ANYBLOB="180000000600000000000000020000008c7552"], &(0x7f0000000a80)='GPL\x00', 0x100, 0x9d, &(0x7f0000000ac0)=""/157, 0x40f00, 0x5ca9cf73db55c1d8, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000001b80)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000001bc0)={0x0, 0x10, 0x1000, 0x8000}, 0x10, r4}, 0x78) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x2, &(0x7f0000000300)=@raw=[@jmp={0x5, 0x0, 0x7, 0x1, 0x3, 0xfffffffffffffffc, 0x4}, @exit], &(0x7f0000000340)='syzkaller\x00', 0x1c, 0x0, 0x0, 0x41100, 0xe, '\x00', r2, 0x0, r1, 0x8, &(0x7f00000003c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x10, 0x10001}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1b, 0x1, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0xb, 0x4, 0x2, 0x4, 0x1}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x7, &(0x7f0000000180)=""/7, 0x41100, 0x4, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000280)={0x7, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x1, 0x3f, 0x20}, 0x10, r4, r5}, 0x78) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0xfeffffff00000000, 0x43400) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit={0x95, 0x0, 0x1200}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0xe, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) 08:46:51 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000d) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() [ 1790.002031][T28962] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1790.029752][T28962] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1790.050217][T28962] netlink: 173596 bytes leftover after parsing attributes in process `syz-executor.0'. 08:46:53 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0xff, 0x40, 0x4, 0x0, 0x0, 0x1c60, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, 0x0, 0x13818, 0x9, 0x5, 0x3, 0x4, 0x4, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000100)="de4fdc0a6e2a57b6c51192c55fabeae7ffd897ceabab24f11b420809676a7aa0d213db421d5caffda8d428d7d50c5905fedf8eddaff8337a50c1c40f", 0x3c}], 0x1, &(0x7f0000000840)=[{0x70, 0x0, 0x7, "f398cb455bb12c49e7faf4919e30fa6d4b8ea3ecbb7299df4b00e9b1a9c2335dff07e9457b2739d668ef863fce4f5038fe87886b5668bb974c9fa171de77fc4a3ab0b9ce01016fa466caf85dda78c50b153af395ecc1c8eae1e986ac588c62a2"}, {0x58, 0x11f, 0x1f, "ffc5696d46dee66e97d6a967602f9aad76e99756c6402405477744a4af82ee9b2fc7c86159724d8f83cab476470b810fecba67a5993f107d49fed90f58f1b3eb560d7a538b46e5"}], 0xc8}, 0x8000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x8) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x56, 0x1, 0x0, 0x0, 0x6e, 0x80a, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x6, 0xb8b, 0x100}, r4, 0x2, 0xffffffffffffffff, 0x3) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000050000000000000001989f871fb248973d04000018000000ffff00000000000095cc000077bc3a0100100000003d524000ffffffff95000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x88, &(0x7f00000005c0)=""/136, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x3, 0xffff8001, 0x5}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000700)=r6, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0xf8, 0x40, 0x0, 0xf8, 0x0, 0x80000000, 0xd6241, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0xe8a0, 0x6, 0xbb4, 0x0, 0xa, 0xffff8001, 0xffe}, r2, 0xd, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x46, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xd9, 0x1, 0x9, 0x7c, 0x0, 0xf3, 0xa000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x0, 0x80, 0x4, 0x7, 0x1, 0x6, 0x7ff, 0x2bf}, r4, 0x2000d, r3, 0x4) syz_open_procfs$namespace(r4, &(0x7f0000000240)='ns/time\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x1, 0x0, 0x1f, 0x0, 0x0, 0xe861, 0x80222, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, 0x0, 0x30, 0xffffffff, 0x8, 0x5, 0x9, 0x4, 0x3}, 0x0, 0x5, r7, 0x0) 08:46:53 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="63eced8e46dcc9f7b98600000000", 0x0, 0x38e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 08:46:53 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x1b}, 0x14) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) r5 = openat$cgroup_ro(r1, &(0x7f00000002c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000300)='cpuacct.usage_all\x00', 0x0, 0x0) gettid() 08:46:53 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000013fc0)={&(0x7f0000013c00)=@can={0x1d, 0x0}, 0x80, 0x0, 0x0, &(0x7f0000013ec0)=""/246, 0xf6}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=0xffffffffffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xa, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x7, 0x10000001}, 0x0, 0x0, &(0x7f0000000900)={0x0, 0x10, 0x1, 0xffffff16}, &(0x7f0000000340)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0xffffffffffffffff}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001c00)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000a40)=ANY=[@ANYBLOB="180000000600000000000000020000008c7552"], &(0x7f0000000a80)='GPL\x00', 0x100, 0x9d, &(0x7f0000000ac0)=""/157, 0x40f00, 0x5ca9cf73db55c1d8, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000001b80)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000001bc0)={0x0, 0x10, 0x1000, 0x8000}, 0x10, r4}, 0x78) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x2, &(0x7f0000000300)=@raw=[@jmp={0x5, 0x0, 0x7, 0x1, 0x3, 0xfffffffffffffffc, 0x4}, @exit], &(0x7f0000000340)='syzkaller\x00', 0x1c, 0x0, 0x0, 0x41100, 0xe, '\x00', r2, 0x0, r1, 0x8, &(0x7f00000003c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x10, 0x10001}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1b, 0x1, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0xb, 0x4, 0x2, 0x4, 0x1}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x7, &(0x7f0000000180)=""/7, 0x41100, 0x4, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000280)={0x7, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x1, 0x3f, 0x20}, 0x10, r4, r5}, 0x78) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0xfeffffff00000000, 0x43400) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit={0x95, 0x0, 0x1200}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0xe, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) 08:46:53 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='freezer.self_freezing\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x5, &(0x7f00000001c0)=@raw=[@exit, @exit, @ldst={0x0, 0x3, 0x3, 0x4, 0x8, 0x1, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @alu={0x7, 0x0, 0x6, 0xa, 0x5, 0xffffffffffffffd2, 0xfffffffffffffff8}], &(0x7f0000000240)='GPL\x00', 0x1, 0x97, &(0x7f00000002c0)=""/151, 0x40f00, 0x10, '\x00', 0x0, 0x2c, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x3, 0x3, 0x6}, 0x10, 0x0, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="299c00080d000000a56c16bef7532f13732946d06b164bcc31e1d95dae6fcfa47a57257f4c0844b2ce712385cff50a2b13fc83a45da6d29952a9cab82198178049128c1f644a473cbf2829a3716c50624a6c2a0bf797be7b24156fe3aff75ae8b27ebcc8c4cd10461cd2a3d900"], &(0x7f0000000280)='syzkaller\x00', 0x3, 0x56, &(0x7f0000000580)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x20000005, 0x4}, 0x8, 0x10, 0x0}, 0x78) gettid() 08:46:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="440003002200055bd25a80648c63940d0524fc60100010400a000a00053582c137153e37025b038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1790.627842][T29004] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 1790.717286][T29004] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 1790.869674][T29004] netlink: 173340 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1895.938728][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 1895.945527][ C0] rcu: 0-...!: (10476 ticks this GP) idle=ff2/1/0x4000000000000000 softirq=196060/196063 fqs=0 [ 1895.958035][ C0] (t=10501 jiffies g=317361 q=331) [ 1895.963353][ C0] rcu: rcu_preempt kthread timer wakeup didn't happen for 10501 jiffies! g317361 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 [ 1895.975917][ C0] rcu: Possible timer handling issue on cpu=1 timer-softirq=162893 [ 1895.983943][ C0] rcu: rcu_preempt kthread starved for 10504 jiffies! g317361 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=1 [ 1895.995531][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 1896.005526][ C0] rcu: RCU grace-period kthread stack dump: [ 1896.011455][ C0] task:rcu_preempt state:I stack:29096 pid: 14 ppid: 2 flags:0x00004000 [ 1896.020703][ C0] Call Trace: [ 1896.024034][ C0] __schedule+0x911/0x21b0 [ 1896.028489][ C0] ? io_schedule_timeout+0x140/0x140 [ 1896.033803][ C0] ? debug_object_destroy+0x210/0x210 [ 1896.039229][ C0] schedule+0xcf/0x270 [ 1896.043415][ C0] schedule_timeout+0x14a/0x250 [ 1896.048301][ C0] ? usleep_range+0x170/0x170 [ 1896.053016][ C0] ? lockdep_hardirqs_on+0x79/0x100 [ 1896.058249][ C0] ? __next_timer_interrupt+0x210/0x210 [ 1896.063831][ C0] ? prepare_to_swait_exclusive+0x2d0/0x2d0 [ 1896.069766][ C0] rcu_gp_kthread+0xd07/0x2250 [ 1896.074570][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 1896.079457][ C0] ? call_rcu+0x740/0x740 [ 1896.083818][ C0] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 1896.089713][ C0] ? lockdep_hardirqs_on+0x79/0x100 [ 1896.094952][ C0] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 1896.101254][ C0] ? __kthread_parkme+0x13f/0x1e0 [ 1896.106328][ C0] ? call_rcu+0x740/0x740 [ 1896.110701][ C0] kthread+0x3b1/0x4a0 [ 1896.114908][ C0] ? __kthread_bind_mask+0xc0/0xc0 [ 1896.120080][ C0] ret_from_fork+0x1f/0x30 [ 1896.124562][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 1896.130901][ C0] Sending NMI from CPU 0 to CPUs 1: [ 1896.137340][ C1] NMI backtrace for cpu 1 [ 1896.137353][ C1] CPU: 1 PID: 29014 Comm: syz-executor.4 Not tainted 5.12.0-rc4-syzkaller #0 [ 1896.137365][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1896.137376][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x60 [ 1896.137387][ C1] Code: f0 4d 89 03 e9 f2 fc ff ff b9 ff ff ff ff ba 08 00 00 00 4d 8b 03 48 0f bd ca 49 8b 45 00 48 63 c9 e9 64 ff ff ff 0f 1f 40 00 <65> 8b 05 59 f9 8d 7e 89 c1 48 8b 34 24 81 e1 00 01 00 00 65 48 8b [ 1896.137405][ C1] RSP: 0018:ffffc90000dc0778 EFLAGS: 00000046 [ 1896.137419][ C1] RAX: 0000000000000000 RBX: ffffc90000dc0910 RCX: ffff88807a281c40 [ 1896.137429][ C1] RDX: 0000000000000000 RSI: ffff88807a281c40 RDI: 0000000000000003 [ 1896.137439][ C1] RBP: ffffc90000dc08a8 R08: 0000000000000005 R09: 0000000000000000 [ 1896.137449][ C1] R10: ffffffff81010bdd R11: 0000000000000000 R12: ffffffff817fcec9 [ 1896.137460][ C1] R13: dffffc0000000000 R14: 0000000000000000 R15: ffffc90000dc07e0 [ 1896.137470][ C1] FS: 00007f93d5040700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 1896.137481][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1896.137490][ C1] CR2: 0000000100000000 CR3: 0000000077529000 CR4: 00000000001506e0 [ 1896.137500][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1896.137510][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1896.137518][ C1] Call Trace: [ 1896.137523][ C1] [ 1896.137529][ C1] perf_callchain_kernel+0x3eb/0x6a0 [ 1896.137536][ C1] ? arch_perf_update_userpage+0x360/0x360 [ 1896.137543][ C1] ? bpf_prog_alloc_no_stats+0x39/0x360 [ 1896.137550][ C1] ? get_callchain_entry+0x1df/0x3d0 [ 1896.137557][ C1] get_perf_callchain+0x171/0x550 [ 1896.137565][ C1] ? put_callchain_entry+0xa0/0xa0 [ 1896.137572][ C1] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 1896.137579][ C1] perf_callchain+0x165/0x1c0 [ 1896.137586][ C1] perf_prepare_sample+0xa22/0x1e90 [ 1896.137593][ C1] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 1896.137600][ C1] ? perf_callchain+0x1c0/0x1c0 [ 1896.137607][ C1] perf_event_output_forward+0xf3/0x270 [ 1896.137615][ C1] ? perf_prepare_sample+0x1e90/0x1e90 [ 1896.137622][ C1] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 1896.137631][ C1] __perf_event_overflow+0x13c/0x370 [ 1896.137638][ C1] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 1896.137646][ C1] perf_swevent_hrtimer+0x37c/0x3f0 [ 1896.137654][ C1] ? __perf_event_overflow+0x370/0x370 [ 1896.137661][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 1896.137668][ C1] ? find_held_lock+0x2d/0x110 [ 1896.137675][ C1] ? __hrtimer_run_queues+0x51a/0xe40 [ 1896.137682][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 1896.137689][ C1] ? __perf_event_overflow+0x370/0x370 [ 1896.137697][ C1] __hrtimer_run_queues+0x1c0/0xe40 [ 1896.137705][ C1] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 1896.137713][ C1] ? ktime_get_update_offsets_now+0x3eb/0x5c0 [ 1896.137720][ C1] hrtimer_interrupt+0x330/0xa00 [ 1896.137727][ C1] __sysvec_apic_timer_interrupt+0x146/0x540 [ 1896.137735][ C1] sysvec_apic_timer_interrupt+0x8e/0xc0 [ 1896.137742][ C1] [ 1896.137748][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1896.137756][ C1] RIP: 0010:__pv_queued_spin_lock_slowpath+0x3c4/0xb40 [ 1896.137768][ C1] Code: 00 48 c1 e9 03 83 e3 07 41 be 01 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8d 2c 01 eb 0c f3 90 41 83 ec 01 0f 84 72 04 00 00 <41> 0f b6 45 00 38 d8 7f 08 84 c0 0f 85 91 05 00 00 0f b6 45 00 84 [ 1896.137786][ C1] RSP: 0018:ffffc90001ddf808 EFLAGS: 00000206 [ 1896.137799][ C1] RAX: 0000000000000003 RBX: 0000000000000000 RCX: 1ffffffff18118d0 [ 1896.137809][ C1] RDX: 0000000000000001 RSI: ffffffff8179e5d1 RDI: ffffffff813214c1 [ 1896.137824][ C1] RBP: ffffffff8c08c680 R08: 0000000000000001 R09: 0000000000000001 [ 1896.137834][ C1] R10: ffffffff8179e599 R11: 0000000000000000 R12: 00000000000066d8 [ 1896.137844][ C1] R13: fffffbfff18118d0 R14: 0000000000000001 R15: ffff8880b9d35f40 [ 1896.137853][ C1] ? trace_hardirqs_on+0x19/0x1c0 [ 1896.137861][ C1] ? trace_hardirqs_on+0x51/0x1c0 [ 1896.137867][ C1] ? kvm_wait+0x51/0x100 [ 1896.137874][ C1] ? __pv_queued_spin_lock_slowpath+0x8b8/0xb40 [ 1896.137882][ C1] ? pv_hash+0x100/0x100 [ 1896.137888][ C1] ? lock_release+0x720/0x720 [ 1896.137895][ C1] do_raw_spin_lock+0x200/0x2b0 [ 1896.137902][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 1896.137909][ C1] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1896.137916][ C1] alloc_vmap_area+0x1ba/0x1e10 [ 1896.137923][ C1] ? free_vmap_area+0x1ac0/0x1ac0 [ 1896.137930][ C1] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1896.137938][ C1] ? trace_kmalloc_node+0xc1/0xf0 [ 1896.137945][ C1] __get_vm_area_node+0x128/0x380 [ 1896.137952][ C1] ? bpf_prog_alloc_no_stats+0x39/0x360 [ 1896.137959][ C1] __vmalloc+0xf3/0x1a0 [ 1896.137966][ C1] ? bpf_prog_alloc_no_stats+0x39/0x360 [ 1896.137973][ C1] bpf_prog_alloc_no_stats+0x39/0x360 [ 1896.137980][ C1] bpf_prog_alloc+0x2c/0x200 [ 1896.137987][ C1] bpf_prog_load+0x656/0x1f40 [ 1896.137994][ C1] ? __bpf_prog_put.constprop.0+0x1a0/0x1a0 [ 1896.138001][ C1] ? __might_fault+0xd3/0x180 [ 1896.138009][ C1] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 1896.138017][ C1] __do_sys_bpf+0x1272/0x4f40 [ 1896.138024][ C1] ? bpf_link_get_from_fd+0x110/0x110 [ 1896.138031][ C1] ? find_held_lock+0x2d/0x110 [ 1896.138038][ C1] ? __context_tracking_exit+0xb8/0xe0 [ 1896.138045][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 1896.138053][ C1] ? syscall_enter_from_user_mode+0x27/0x70 [ 1896.138060][ C1] do_syscall_64+0x2d/0x70 [ 1896.138067][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1896.138075][ C1] RIP: 0033:0x4665f9 [ 1896.138085][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1896.138103][ C1] RSP: 002b:00007f93d5040188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1896.138118][ C1] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1896.138128][ C1] RDX: 0000000000000078 RSI: 0000000020000680 RDI: 0000000000000005 [ 1896.138137][ C1] RBP: 00000000004bfbb9 R08: 0000000000000000 R09: 0000000000000000 [ 1896.138145][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 1896.138155][ C1] R13: 00007ffd3e9095ff R14: 00007f93d5040300 R15: 0000000000022000 [ 1896.138217][ C0] NMI backtrace for cpu 0 [ 1896.756632][ C0] CPU: 0 PID: 29003 Comm: syz-executor.3 Not tainted 5.12.0-rc4-syzkaller #0 [ 1896.765428][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1896.775513][ C0] Call Trace: [ 1896.778813][ C0] [ 1896.781675][ C0] dump_stack+0x141/0x1d7 [ 1896.786035][ C0] nmi_cpu_backtrace.cold+0x44/0xd7 [ 1896.791283][ C0] ? lapic_can_unplug_cpu+0x80/0x80 [ 1896.796522][ C0] nmi_trigger_cpumask_backtrace+0x1b3/0x230 [ 1896.802574][ C0] rcu_dump_cpu_stacks+0x222/0x2a7 [ 1896.807861][ C0] rcu_sched_clock_irq.cold+0x4f7/0x11dd [ 1896.813542][ C0] ? find_held_lock+0x2d/0x110 [ 1896.818341][ C0] ? rcutree_dead_cpu+0x50/0x50 [ 1896.823232][ C0] ? tick_sched_timer+0x2b/0x2d0 [ 1896.828228][ C0] update_process_times+0x16d/0x200 [ 1896.833464][ C0] tick_sched_handle+0x9b/0x180 [ 1896.838351][ C0] tick_sched_timer+0x1b0/0x2d0 [ 1896.843238][ C0] ? get_cpu_iowait_time_us+0x3f0/0x3f0 [ 1896.848815][ C0] __hrtimer_run_queues+0x1c0/0xe40 [ 1896.854067][ C0] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 1896.860077][ C0] ? ktime_get_update_offsets_now+0x3eb/0x5c0 [ 1896.866191][ C0] hrtimer_interrupt+0x330/0xa00 [ 1896.871180][ C0] __sysvec_apic_timer_interrupt+0x146/0x540 [ 1896.877198][ C0] sysvec_apic_timer_interrupt+0x40/0xc0 [ 1896.882865][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1896.888884][ C0] RIP: 0010:mac80211_hwsim_tx_frame_no_nl.isra.0+0x737/0x1330 [ 1896.896402][ C0] Code: b6 44 24 08 84 c0 0f 85 a8 06 00 00 e8 f2 29 55 fc e8 ed 29 55 fc 48 89 d8 48 c1 e8 03 80 3c 28 00 0f 85 93 09 00 00 48 8b 1b <48> 81 fb 20 4c d4 8c 0f 84 f7 04 00 00 e8 c7 29 55 fc 49 39 de 4c [ 1896.916042][ C0] RSP: 0018:ffffc90000007ba8 EFLAGS: 00000246 [ 1896.922143][ C0] RAX: 1ffff110029dd63c RBX: ffff8880624b31e0 RCX: 0000000000000100 [ 1896.930142][ C0] RDX: ffff88801efb3880 RSI: ffffffff851ecc73 RDI: 0000000000000003 [ 1896.938141][ C0] RBP: dffffc0000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1896.946139][ C0] R10: ffffffff851ecce9 R11: 0000000000000000 R12: ffff88805f08da00 [ 1896.954245][ C0] R13: ffff88805e86b410 R14: ffff88805e86b1e0 R15: 0000000000000000 [ 1896.962248][ C0] ? mac80211_hwsim_tx_frame_no_nl.isra.0+0x799/0x1330 [ 1896.969139][ C0] ? mac80211_hwsim_tx_frame_no_nl.isra.0+0x723/0x1330 [ 1896.976027][ C0] ? mac80211_hwsim_tx_frame_no_nl.isra.0+0x723/0x1330 [ 1896.982921][ C0] ? mac80211_hwsim_add_chanctx+0x220/0x220 [ 1896.988859][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1896.995053][ C0] ? ktime_get_with_offset+0x1ef/0x500 [ 1897.000540][ C0] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 1897.006805][ C0] ? mac80211_hwsim_monitor_rx+0x1c2/0x840 [ 1897.012660][ C0] mac80211_hwsim_tx_frame+0x14f/0x1e0 [ 1897.018155][ C0] mac80211_hwsim_beacon_tx+0x4ba/0x910 [ 1897.023734][ C0] __iterate_interfaces+0x1e5/0x520 [ 1897.029013][ C0] ? mac80211_hwsim_tx_frame+0x1e0/0x1e0 [ 1897.034675][ C0] ? mac80211_hwsim_tx_frame+0x1e0/0x1e0 [ 1897.040351][ C0] ? mac80211_hwsim_addr_match+0x180/0x180 [ 1897.046184][ C0] ieee80211_iterate_active_interfaces_atomic+0x8d/0x170 [ 1897.053242][ C0] mac80211_hwsim_beacon+0xd5/0x1a0 [ 1897.058476][ C0] __hrtimer_run_queues+0x609/0xe40 [ 1897.063709][ C0] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 1897.069730][ C0] ? ktime_get_update_offsets_now+0x3eb/0x5c0 [ 1897.075840][ C0] hrtimer_run_softirq+0x17b/0x360 [ 1897.080993][ C0] __do_softirq+0x29b/0x9f6 [ 1897.086576][ C0] irq_exit_rcu+0x134/0x200 [ 1897.091102][ C0] sysvec_apic_timer_interrupt+0x93/0xc0 [ 1897.096783][ C0] [ 1897.099725][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1897.105997][ C0] RIP: 0010:lock_release+0x53a/0x720 [ 1897.111308][ C0] Code: ff 05 ea 44 a8 7e 48 8b 05 23 18 58 0c e8 0e fc ab 07 85 c0 74 0d 80 3d df 9d 57 0c 00 0f 84 9b 00 00 00 65 ff 0d c6 44 a8 7e <0f> 85 6f fb ff ff e8 3a 9a a6 ff e9 65 fb ff ff e8 21 f7 ab 07 e9 [ 1897.130939][ C0] RSP: 0018:ffffc90001caf348 EFLAGS: 00000202 [ 1897.137044][ C0] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000000000000001 [ 1897.145038][ C0] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000000 [ 1897.153029][ C0] RBP: 1ffff92000395e6b R08: 0000000000000000 R09: ffffffff8dc5aacf [ 1897.161027][ C0] R10: fffffbfff1b8b559 R11: 000000000000003f R12: ffffffff8c0988a0 [ 1897.169028][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: fffff52000388000 [ 1897.177072][ C0] ? lock_release+0x5d3/0x720 [ 1897.181810][ C0] ? kasan_depopulate_vmalloc_pte+0x68/0x70 [ 1897.187761][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 1897.192763][ C0] ? mark_held_locks+0x9f/0xe0 [ 1897.197554][ C0] ? free_unref_page+0x167/0x1d0 [ 1897.202521][ C0] _raw_spin_unlock+0x12/0x40 [ 1897.207228][ C0] kasan_depopulate_vmalloc_pte+0x68/0x70 [ 1897.212976][ C0] __apply_to_page_range+0x645/0xdf0 [ 1897.218316][ C0] ? __kasan_check_write+0x10/0x10 [ 1897.223473][ C0] kasan_release_vmalloc+0xa7/0xc0 [ 1897.228719][ C0] __purge_vmap_area_lazy+0x8f9/0x1c50 [ 1897.234225][ C0] ? insert_vmap_area_augment.constprop.0+0x820/0x820 [ 1897.241014][ C0] ? _find_next_bit.constprop.0+0x1a0/0x200 [ 1897.246930][ C0] ? lockdep_hardirqs_on+0x79/0x100 [ 1897.252163][ C0] _vm_unmap_aliases.part.0+0x3d6/0x4e0 [ 1897.257753][ C0] vm_unmap_aliases+0x47/0x50 [ 1897.262457][ C0] change_page_attr_set_clr+0x241/0x500 [ 1897.268037][ C0] ? __change_page_attr_set_clr+0x1e10/0x1e10 [ 1897.274154][ C0] ? find_vm_area+0x117/0x190 [ 1897.278870][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 1897.283769][ C0] set_memory_ro+0x78/0xa0 [ 1897.288226][ C0] ? set_memory_nx+0x110/0x110 [ 1897.293062][ C0] ? _raw_spin_unlock+0x24/0x40 [ 1897.298323][ C0] ? find_vm_area+0x145/0x190 [ 1897.303146][ C0] bpf_int_jit_compile+0xe11/0x11b0 [ 1897.308392][ C0] ? arch_prepare_bpf_dispatcher+0xc0/0xc0 [ 1897.314274][ C0] ? bpf_check+0xb225/0xcd10 [ 1897.318908][ C0] bpf_check+0xb875/0xcd10 [ 1897.323417][ C0] ? bpf_get_btf_vmlinux+0x80/0x80 [ 1897.328592][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1897.334805][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1897.341000][ C0] ? bpf_prog_load+0xe25/0x1f40 [ 1897.345905][ C0] ? bpf_prog_load+0xe25/0x1f40 [ 1897.351163][ C0] bpf_prog_load+0xe47/0x1f40 [ 1897.355888][ C0] ? __bpf_prog_put.constprop.0+0x1a0/0x1a0 [ 1897.361857][ C0] ? __might_fault+0xd3/0x180 [ 1897.366589][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 1897.372872][ C0] __do_sys_bpf+0x1272/0x4f40 [ 1897.377589][ C0] ? bpf_link_get_from_fd+0x110/0x110 [ 1897.382996][ C0] ? find_held_lock+0x2d/0x110 [ 1897.387808][ C0] ? __context_tracking_exit+0xb8/0xe0 [ 1897.393324][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 1897.398223][ C0] ? syscall_enter_from_user_mode+0x27/0x70 [ 1897.404158][ C0] do_syscall_64+0x2d/0x70 [ 1897.408623][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1897.414554][ C0] RIP: 0033:0x4665f9 [ 1897.418472][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1897.438113][ C0] RSP: 002b:00007ff39248b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1897.446562][ C0] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1897.454561][ C0] RDX: 0000000000000070 RSI: 0000000020000440 RDI: 0000000000000005 [ 1897.462555][ C0] RBP: 00000000004bfbb9 R08: 0000000000000000 R09: 0000000000000000 [ 1897.470553][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 1897.478587][ C0] R13: 00007fffd64c0e8f R14: 00007ff39248b300 R15: 0000000000022000