f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x4) r6 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r7 = gettid() r8 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r7, r8, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r9, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r10, 0x401054d6, 0x0) 10:34:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x49, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x1b, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff810000000000020000000008", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:34:31 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) 10:34:31 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, 0x0) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:34:31 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01l\x00', 0x4009}) 10:34:31 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) sendmsg$kcm(r3, &(0x7f00000002c0)={&(0x7f0000000680)=@in6={0xa, 0x4e23, 0x4, @loopback, 0x2}, 0x80, &(0x7f0000001c80)=[{&(0x7f0000000780)="7fd6d6417f6150c2a1dfcc67d28fd7c9fb390cbc9c24140207eb3d93523b348c4619f5e9791ae1f1d3a5d8b4eda942ee53b303252babdfa1c879525aa2cb8125168556e5a8ce433cd89669bf9f25ceb4cbdef27a933c921cc9a0d0db629eccb43718b85169aa83cef4ed44c143c432ca6f7f195d280d1d9298351aa14a15a0555d27ef20e395bd1683a213c5bc00503b51338849bcb5f1bb785350f0dba1db8a20fe2fecdf5e7c8820a009db828c0c7cd7f519dff1527b2bda651e35b683917687da7f70acad85f9426c4ee147f81e", 0xcf}, {&(0x7f0000000440)="e4cbdc4b2d0613b1b7053a4958176d343d8055cffaae650a673405aac83288af332511373996ecd1e9e5119a4144c455f7756003bde97294a85f4482f27f0b2a65425e8cd7c309fd3f173ffc3fe98b380d9d8e845ff4ca2a", 0x58}, {&(0x7f0000000880)="5ac7056a2d4378d6938aee6593cb3ed2a109b6dcad497162ec12bbbccfc4a367331ee4a7c4092aeb9c52dddd66b1aebe4957691a2ec8567de13a613190d095e66f795e1059fea361487be90bcace0455a5fd9325da26b3dcc343dcb09af202ef8ba098c9f4e09d", 0x67}, {&(0x7f0000000900)="a47722998a4c81a2eb4068042d8c9887dadd270ca4acec07da59a4b1e9efeb098be04067d0d797abeb868741aec90b33516d4358277992443692ddd42dc1ce573bec1177da431658813323836812a19f9e182ab17453b4d3e5e3e23c032830e78dc15e1c17074147ac4d77c83fec77ea0716c47ac8592bec7f5ce48f2311722df705e9f52994abed66dba141316d11a4767f99251a183075c9468b056a522b049185e590e27d934ef599a66e82a7a34bcf6e3d7c1d1254c890712428e864cc5dc15e7c7aa593e6039eba7d06888c3c5ff3bdaace843e961352a226eb647a92", 0xdf}, {0x0}, {&(0x7f0000000700)="605888c8268e3ef7f8a6da1b496e29ebab1b095f46846808f980fcc9ffc0b89696a1373c2da2eaa8c0d6334ef33101e5b24abad2ab46b0d55bfef0", 0x3b}, {&(0x7f0000000a00)="bc4031660dcbfea099744f60c1ba5aee4c7a56036f4278f02b2147e3c70885e72fba0f6f9ab5766f15113bc069cd110c457f6cdeb5c5e0f918a6c3c92328866c62114f6eab9457cb5470ee6e3fbe1516b4b451", 0x53}, {&(0x7f0000000a80)="29efd74253cee67f0a8967d849bc67a87fbf530cd5fe5a3c7ce3af774292c868d678dab84eb1d9547da6145d445489926fc70c07d46a7a1b4a12119c80", 0x3d}], 0x8}, 0x40004) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r3, 0x0, 0xf800000000000000) r4 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x10, r3, 0x1) r5 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0xccd, 0x0, 0x3, 0x0, 0x1f, 0x1000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xd}, 0x0, 0x40000000000000, 0x3, 0x3}, r5, 0xe, r4, 0xa6f54f15e4426112) perf_event_open(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0x7, 0x9, 0xc1, 0x0, 0x8, 0x8, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_config_ext={0x0, 0xfb}, 0x10, 0x1, 0xfffffffc, 0x5, 0x64, 0x3, 0x1}, r5, 0x9, 0xffffffffffffffff, 0x8) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) r7 = perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0x1d, 0x3, 0xe9, 0xfc, 0x0, 0x7f, 0x0, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80, 0x4, @perf_config_ext={0x1ff, 0x6}, 0xa, 0x6, 0x9, 0x24764ecde0eb7095, 0x3, 0xf8af, 0xcfd}, r6, 0x40, 0xffffffffffffffff, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\r\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000080)={r8}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r9, 0x400454cd, 0x7) r10 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(r10, 0x0, 0x200002, 0x0) openat$cgroup(r10, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) close(r9) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz0\x00', 0x1ff) r11 = socket$kcm(0x29, 0x6, 0x0) recvmsg$kcm(r11, &(0x7f0000000300)={&(0x7f00000000c0)=@sco, 0x80, &(0x7f0000000280)=[{&(0x7f0000000180)=""/203, 0xcb}], 0x1, &(0x7f00000002c0)=""/18, 0x12}, 0x8b0ac21e92cb0eac) 10:34:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x49, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e70ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf0000000000000000000000000000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ce72c74f3db890e1ff15a10d91f27e9a232fe2238fff867ba8fd41b29caad2a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c6e62d0967ab7e43686b4d1e03e326beea7905ef7de375ef8bc8143df20d13c37db2699f1210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd83ac3440b7a6042491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f9197e7a5513c13e79d46bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x1b, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff810000000000020000000008", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:34:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x49, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e70ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf0000000000000000000000000000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ce72c74f3db890e1ff15a10d91f27e9a232fe2238fff867ba8fd41b29caad2a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c6e62d0967ab7e43686b4d1e03e326beea7905ef7de375ef8bc8143df20d13c37db2699f1210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd83ac3440b7a6042491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f9197e7a5513c13e79d46bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x1b, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff810000000000020000000008", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 2992.893610][T23576] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 2992.902990][T23576] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:34:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x49, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x1b, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff810000000000020000000008", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:34:31 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7947c101e4600800000efff065900001943449fc1dcf86e0008d70000000000c6b5af027400005822e8f98b2b4077445b2fef3efddc547d08d3f4215a73e8d9ffcd60ac4807eafef8078a0f219e25e2a0e0a729aa6d43bc1107b9cf2a89a797cd5c578f0000000000000000000000000000000000000056a62e5a1aa8fb8856e1e0333a81dc43d3baea26962ade38deb5629dd4dabb0f32ba9b6ca4d5c2247c1621b8a5f49fbf922256de3b9579ae270980003cabc10d38e4ffd7bd80080f53ca9e4127035460328f4b77e121254b0313a191ec0dc15a949dd272f38d32e06f864aa93a0cf2df860a36f952717c788e5617a566440e22cddb2310acdf7d25b3f00d49b8b87ceb3d9eb49e58aa8fb3638d4036905bbf66c3b0de83568bdd2e8afdf6f80600000000000000000000000000000000000000b2d980d9714429b928c4b9eeff737a645fea18800d9e1d97e28c593694a0bec53608bcbed51d99987ead09b639bb9f7c6300ae0d556d16334413a8a80e440a3c5e89734ba69bdb6b63c89e777bebae18c0b6ee92260506989430696df40dc6a1c168b3b91f464e67bc8bc44cf66f8e8c37c94cbab1abc01afbdb700299ea8908f94f0fceb5c5484d180f76024813eb213fc8f01ef9b57d2158c6831aa373783995b0e84fdfdfb7a5048679bd2c32bba5763fcc15143d3d18166f752390bbb3c3fc0ee660b9a412be819af0"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, 0x0) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:34:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x49, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x1b, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff810000000000020000000008", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:34:31 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) [ 2993.239820][T23606] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 2993.252967][T23606] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:34:38 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:34:38 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x49, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x1b, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff810000000000020000000008", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:34:38 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01t\x00', 0x4009}) 10:34:38 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, 0x0) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:34:38 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) 10:34:38 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev2net/tun\x00', 0x800, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x7) close(r1) 10:34:38 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x49, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x1b, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff810000000000020000000008", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:34:38 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x49, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x1b, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff810000000000020000000008", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:34:38 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 3000.097134][T23619] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3000.130678][T23619] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:34:38 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:34:38 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 10:34:38 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) [ 3000.348713][T23637] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3000.363807][T23637] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:34:53 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:34:53 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 10:34:53 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01z\x00', 0x4009}) 10:34:53 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7947c101e4600800000efff065900001943449fc1dcf86e0008d70000000000c6b5af027400005822e8f98b2b4077445b2fef3efddc547d08d3f4215a73e8d9ffcd60ac4807eafef8078a0f219e25e2a0e0a729aa6d43bc1107b9cf2a89a797cd5c578f0000000000000000000000000000000000000056a62e5a1aa8fb8856e1e0333a81dc43d3baea26962ade38deb5629dd4dabb0f32ba9b6ca4d5c2247c1621b8a5f49fbf922256de3b9579ae270980003cabc10d38e4ffd7bd80080f53ca9e4127035460328f4b77e121254b0313a191ec0dc15a949dd272f38d32e06f864aa93a0cf2df860a36f952717c788e5617a566440e22cddb2310acdf7d25b3f00d49b8b87ceb3d9eb49e58aa8fb3638d4036905bbf66c3b0de83568bdd2e8afdf6f80600000000000000000000000000000000000000b2d980d9714429b928c4b9eeff737a645fea18800d9e1d97e28c593694a0bec53608bcbed51d99987ead09b639bb9f7c6300ae0d556d16334413a8a80e440a3c5e89734ba69bdb6b63c89e777bebae18c0b6ee92260506989430696df40dc6a1c168b3b91f464e67bc8bc44cf66f8e8c37c94cbab1abc01afbdb700299ea8908f94f0fceb5c5484d180f76024813eb213fc8f01ef9b57d2158c6831aa373783995b0e84fdfdfb7a5048679bd2c32bba5763fcc15143d3d18166f752390bbb3c3fc0ee660b9a412be819af0"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:34:53 executing program 3: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) 10:34:53 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000002c0)=0xa7) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000500)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x7) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r3, &(0x7f0000000100), &(0x7f0000000000), 0x1}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x6, 0x3a814dff, 0xfff, 0x0, 0x10, r3, 0x6, [], 0x0, r4}, 0x3c) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x301) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') sendmsg$kcm(r5, &(0x7f0000000100)={&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x1, 0x4, 0x2, {0xa, 0x4e22, 0x0, @loopback, 0x2}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="34d4ec5eca88e904778f7e8a298b070aaa1e91b1a1e4ae53cbf0c8269001135faeace234e1c770dd665c875d94acd052a54da93fb7671d20e43f4d21262df520c4b3606ea5045407f20a7f727276ea35ab8bbb247cecfafc63b4162e1332fbbe87e882e78f2cf270ed8273815c543c6ce090af3e42a3543a4c9f9a8f9e1801bd605e95f2512d05cd4a69ad19dd", 0x8d}, {&(0x7f00000000c0)="bc161f706bfd1ddcbc2d30b5f4b3ca1ccb", 0x11}, {&(0x7f0000000240)="0d5cf62a1b2ed46bd82a417d85bfa0ab8ccd8c4649ac45ffccdbe0328f5c494dacb099141953c2c59119ddc2a9c285cd8dee916839c9e0ba2622ec5cebfee8822966fc1ee058dd0977080c378d3e5fadf1140d8a3d4ff97fa080", 0x5a}, {&(0x7f00000002c0)="a22fdedb5ff3a43d129d80e068f4712eb085c5827051747912fd7328a5c2a3cfb3931c66609bede2d5c18c106c345ae3e230a39df10040d365d6159d78f6bb9c3f33b9985ad8af5d9c3d965e818bb79d0ffca630334d800aa587fbafdf6c311711f2d8c14f0641d000cb1616639db8a3af5c5b4266dab6d7cad3295a0a83bbe3695fe1ea796fe6015d626ef59a6120d8aae8a3019b4ef2a451", 0x99}, {&(0x7f0000000380)="eaaab4f8f5966c07cf4970483fd8c7a5514037f597aad145d9c7700bfd44ab44bd2b079492edca87ee60eb9a02830bfc95a324cb3fb8235915762db1627ec0164716cf53365fc1fd8b6a7dc3e972da67a262d9a6e6729e496b5a217d872112c4ef6704d6fd0d47a7408256cccddb90", 0x6f}], 0x5}, 0x4000000) close(r2) 10:34:53 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e70ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf0000000000000000000000000000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ce72c74f3db890e1ff15a10d91f27e9a232fe2238fff867ba8fd41b29caad2a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c6e62d0967ab7e43686b4d1e03e326beea7905ef7de375ef8bc8143df20d13c37db2699f1210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd83ac3440b7a6042491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f9197e7a5513c13e79d46bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x1800000000000060, 0x1b, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff810000000000020000000008", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:34:53 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e70ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf0000000000000000000000000000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ce72c74f3db890e1ff15a10d91f27e9a232fe2238fff867ba8fd41b29caad2a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c6e62d0967ab7e43686b4d1e03e326beea7905ef7de375ef8bc8143df20d13c37db2699f1210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd83ac3440b7a6042491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f9197e7a5513c13e79d46bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x1800000000000060, 0x1b, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff810000000000020000000008", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 3015.635395][T23661] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3015.647735][T23661] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:34:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x1800000000000060, 0x1b, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff810000000000020000000008", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:34:54 executing program 3: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) 10:34:54 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7947c101e4600800000efff065900001943449fc1dcf86e0008d70000000000c6b5af027400005822e8f98b2b4077445b2fef3efddc547d08d3f4215a73e8d9ffcd60ac4807eafef8078a0f219e25e2a0e0a729aa6d43bc1107b9cf2a89a797cd5c578f0000000000000000000000000000000000000056a62e5a1aa8fb8856e1e0333a81dc43d3baea26962ade38deb5629dd4dabb0f32ba9b6ca4d5c2247c1621b8a5f49fbf922256de3b9579ae270980003cabc10d38e4ffd7bd80080f53ca9e4127035460328f4b77e121254b0313a191ec0dc15a949dd272f38d32e06f864aa93a0cf2df860a36f952717c788e5617a566440e22cddb2310acdf7d25b3f00d49b8b87ceb3d9eb49e58aa8fb3638d4036905bbf66c3b0de83568bdd2e8afdf6f80600000000000000000000000000000000000000b2d980d9714429b928c4b9eeff737a645fea18800d9e1d97e28c593694a0bec53608bcbed51d99987ead09b639bb9f7c6300ae0d556d16334413a8a80e440a3c5e89734ba69bdb6b63c89e777bebae18c0b6ee92260506989430696df40dc6a1c168b3b91f464e67bc8bc44cf66f8e8c37c94cbab1abc01afbdb700299ea8908f94f0fceb5c5484d180f76024813eb213fc8f01ef9b57d2158c6831aa373783995b0e84fdfdfb7a5048679bd2c32bba5763fcc15143d3d18166f752390bbb3c3fc0ee660b9a412be819af0"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:34:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 3015.981569][T23682] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3015.990200][T23682] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:35:03 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:35:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:35:03 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\f\x01\x00', 0x4009}) 10:35:03 executing program 3: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) 10:35:03 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:35:03 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x3) close(r1) 10:35:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 3024.955306][T23697] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3024.964280][T23697] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:35:03 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01V\x01\x00', 0x4009}) 10:35:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:35:03 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:35:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:35:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 3025.278243][T23724] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3025.300763][T23724] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:35:16 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:35:16 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) 10:35:16 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e70ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf0000000000000000000000000000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ce72c74f3db890e1ff15a10d91f27e9a232fe2238fff867ba8fd41b29caad2a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c6e62d0967ab7e43686b4d1e03e326beea7905ef7de375ef8bc8143df20d13c37db2699f1210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd83ac3440b7a6042491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f9197e7a5513c13e79d46bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaff", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:35:16 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:35:16 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\xf4\x01\x00', 0x4009}) 10:35:16 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000040)) ioctl$TUNSETLINK(r1, 0x400454cd, 0x7) close(r1) 10:35:16 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaff", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 3038.385174][T23744] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3038.394904][T23744] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:35:16 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaff", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:35:16 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x15, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff810000000000", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:35:16 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}]}, 0xa) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:35:16 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) 10:35:17 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x15, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff810000000000", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 3038.724847][T23760] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3038.734640][T23760] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:35:27 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:35:27 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01,\x02\x00', 0x4009}) 10:35:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x15, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff810000000000", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:35:27 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) 10:35:27 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}]}, 0xa) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:35:27 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') recvmsg$kcm(r0, &(0x7f000000dd80)={&(0x7f000000bc40)=@can={0x1d, 0x0}, 0x80, &(0x7f000000dd40)=[{&(0x7f000000bcc0)=""/4096, 0x1000}, {&(0x7f000000ccc0)=""/99, 0x63}, {&(0x7f000000cd40)=""/4096, 0x1000}], 0x3}, 0x2) sendmsg$kcm(r1, &(0x7f000000e240)={&(0x7f000000ddc0)=@ll={0x11, 0x17, r2, 0x1, 0x1, 0x6, @random="6b520bd56dfa"}, 0x80, &(0x7f000000e1c0)=[{&(0x7f000000de40)="d20c884d97851ddc2bdd70ec5c75b583bfce32598657838577b0f66a16764e0e47040b92b4c78e5ccd9af1ed8c8fbdc6e1825560d78f01399612aa8ce5889c2cb9d7855d54ecdc08fa16bb9813438edda8818220d71b74ff9ffd20b0d92dbd969a1db9800cceeb34b5c3144606fa479245eb5bd6e3d49eb107fe7a521ca0547598fdce42083f4d89185c158e8763fe83345ede4463d138559df0a48e704e2466e767e5389d6599727cab7b323f219c9f36cae20c373f464b1acf622e87a46199", 0xc0}, {&(0x7f000000df00)="bf539e", 0x3}, {&(0x7f000000df40)="4179131d8634e767f580aceba1efaa05e0d82736280a7b3b55a356cd368c4b72f8bccddf2139943d3ddaf3a5f1e4da20b28d5f492d21deb3ffd81214cbe4d1f980003346664328fdd682e57862c53d8c485b5287fcef8010b85cc969733fca00bc9d61016f54034988901f01593f607b526ea4b2dd37f5279b1a5ec424f4253ed4546da9838144cc9d4bbb1c57050254973a9c83256464a63c5a667309ab2d893ba1500158c76fbbc0c1bfdb35ebc02013d45927e5e88d2d2846afd2eb81f8557f3b75805295c40788db9f97a537185f14b387c1cf058af11154ae90979b83f6b585e7321f17980f25f76caf4c76", 0xee}, {&(0x7f000000e040)="d8ee7ece416d2458d420c06ddf23ac16997d306ec11aa7d49c8714167de2bfb53deab33a56bc6fb02f06dbd587ba008f65401cdc1f83211b37d831f2da5abd879422621e81231c1e3ac65a88ead37b0deba86dec32fe1d1b790a05c71103e79471ce1a4709d18f5655aef56670eabb0ba623cb8d641be302d6b92dd97f438d12150069c2adc06656ae2ff3db676c8f50cd4b323ecb0142d74886b0d0fa621f2f877ac9bd44535154eae240393431dfc583961238a82333d995e1bef78e23de7fa5b8c650670e", 0xc6}, {&(0x7f000000e140)="75876992b95b120060e9e5acca0f83881e3fd325170bff0c20fd1d7f4f9c8ce5308b74ad312f1aadc7ca4fadad0c73322bc905973a8017655e15efb6b1b5c9a5043b9b812b56cb0ddee8c56187597f2eb8f55f", 0x53}], 0x5}, 0x40540) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x7) close(r3) 10:35:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x18, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff810000000000020000", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:35:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x18, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff810000000000020000", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 3049.698046][T23791] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3049.706169][T23791] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:35:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x18, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff810000000000020000", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:35:28 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}]}, 0xa) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:35:28 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) 10:35:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x1a, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff8100000000000200000000", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 3050.021730][T23809] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3050.037545][T23809] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:35:43 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:35:43 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) 10:35:43 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x018\x02\x00', 0x4009}) 10:35:43 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e70ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf0000000000000000000000000000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ce72c74f3db890e1ff15a10d91f27e9a232fe2238fff867ba8fd41b29caad2a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c6e62d0967ab7e43686b4d1e03e326beea7905ef7de375ef8bc8143df20d13c37db2699f1210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd83ac3440b7a6042491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f9197e7a5513c13e79d46bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x1a, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff8100000000000200000000", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:35:43 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x0, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:35:43 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002680)={0x0, 0x0, 0x0}, 0x20008049) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8905, 0x712000) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x7) close(r2) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000580)={0x0, &(0x7f0000000080)}) recvmsg$kcm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000180)=""/168, 0xa8}, {&(0x7f0000000080)}, {&(0x7f0000000240)=""/168, 0xa8}, {&(0x7f0000000300)=""/79, 0x4f}, {&(0x7f0000000380)=""/199, 0xc7}], 0x5, &(0x7f0000000500)=""/79, 0x4f}, 0x2100) 10:35:43 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) 10:35:43 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) 10:35:43 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e70ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf0000000000000000000000000000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ce72c74f3db890e1ff15a10d91f27e9a232fe2238fff867ba8fd41b29caad2a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c6e62d0967ab7e43686b4d1e03e326beea7905ef7de375ef8bc8143df20d13c37db2699f1210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd83ac3440b7a6042491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f9197e7a5513c13e79d46bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x1a, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff8100000000000200000000", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 3065.126730][T23832] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3065.138412][T23832] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:35:43 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x1b, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff810000000000020000000008", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:35:43 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) 10:35:43 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x0, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) [ 3065.403529][T23847] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3065.438792][T23847] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:35:50 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:35:50 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00\x03\x00', 0x4009}) 10:35:50 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x1b, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff810000000000020000000008", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:35:50 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) 10:35:50 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7947c101e4600800000efff065900001943449fc1dcf86e0008d70000000000c6b5af027400005822e8f98b2b4077445b2fef3efddc547d08d3f4215a73e8d9ffcd60ac4807eafef8078a0f219e25e2a0e0a729aa6d43bc1107b9cf2a89a797cd5c578f0000000000000000000000000000000000000056a62e5a1aa8fb8856e1e0333a81dc43d3baea26962ade38deb5629dd4dabb0f32ba9b6ca4d5c2247c1621b8a5f49fbf922256de3b9579ae270980003cabc10d38e4ffd7bd80080f53ca9e4127035460328f4b77e121254b0313a191ec0dc15a949dd272f38d32e06f864aa93a0cf2df860a36f952717c788e5617a566440e22cddb2310acdf7d25b3f00d49b8b87ceb3d9eb49e58aa8fb3638d4036905bbf66c3b0de83568bdd2e8afdf6f80600000000000000000000000000000000000000b2d980d9714429b928c4b9eeff737a645fea18800d9e1d97e28c593694a0bec53608bcbed51d99987ead09b639bb9f7c6300ae0d556d16334413a8a80e440a3c5e89734ba69bdb6b63c89e777bebae18c0b6ee92260506989430696df40dc6a1c168b3b91f464e67bc8bc44cf66f8e8c37c94cbab1abc01afbdb700299ea8908f94f0fceb5c5484d180f76024813eb213fc8f01ef9b57d2158c6831aa373783995b0e84fdfdfb7a5048679bd2c32bba5763fcc15143d3d18166f752390bbb3c3fc0ee660b9a412be819af0"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x0, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:35:50 executing program 0: 10:35:50 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0x1b, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff810000000000020000000008", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:35:50 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) 10:35:50 executing program 1: 10:35:50 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) [ 3072.251727][T23882] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3072.269247][T23882] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:35:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x4}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:35:50 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00\x05\x00', 0x4009}) 10:36:01 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:36:01 executing program 1: socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_int(r1, &(0x7f00000000c0), 0xffffff19) close(r0) 10:36:01 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'pids'}]}, 0xc) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:36:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00\x06\x00', 0x4009}) 10:36:01 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) 10:36:01 executing program 0: 10:36:01 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00'}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) 10:36:01 executing program 1: 10:36:01 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00'}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) [ 3083.584176][T23905] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3083.607987][T23905] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:36:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1817000000000000000071000000000000000000000000893d9c950000000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x3b) 10:36:02 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'pids'}]}, 0xc) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:36:02 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00'}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) [ 3083.949723][T23937] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3083.966725][T23937] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:36:17 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:36:17 executing program 1: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_int(r0, &(0x7f00000000c0), 0xffffff19) 10:36:17 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x20) close(r1) 10:36:17 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00\a\x00', 0x4009}) 10:36:17 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'pids'}]}, 0xc) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:36:17 executing program 0: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x0, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) [ 3099.000570][T23952] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3099.009022][T23952] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:36:17 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x0, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:36:17 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x20) close(r1) [ 3099.250775][T23964] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3099.279455][T23964] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:36:17 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x0, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:36:17 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00\n\x00', 0x4009}) [ 3099.462466][T23967] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3099.471610][T23967] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:36:17 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x20) close(r1) 10:36:17 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x0, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) [ 3099.697506][T23979] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3099.705727][T23979] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:36:28 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7947c101e4600800000efff065900001943449fc1dcf86e0008d70000000000c6b5af027400005822e8f98b2b4077445b2fef3efddc547d08d3f4215a73e8d9ffcd60ac4807eafef8078a0f219e25e2a0e0a729aa6d43bc1107b9cf2a89a797cd5c578f0000000000000000000000000000000000000056a62e5a1aa8fb8856e1e0333a81dc43d3baea26962ade38deb5629dd4dabb0f32ba9b6ca4d5c2247c1621b8a5f49fbf922256de3b9579ae270980003cabc10d38e4ffd7bd80080f53ca9e4127035460328f4b77e121254b0313a191ec0dc15a949dd272f38d32e06f864aa93a0cf2df860a36f952717c788e5617a566440e22cddb2310acdf7d25b3f00d49b8b87ceb3d9eb49e58aa8fb3638d4036905bbf66c3b0de83568bdd2e8afdf6f80600000000000000000000000000000000000000b2d980d9714429b928c4b9eeff737a645fea18800d9e1d97e28c593694a0bec53608bcbed51d99987ead09b639bb9f7c6300ae0d556d16334413a8a80e440a3c5e89734ba69bdb6b63c89e777bebae18c0b6ee92260506989430696df40dc6a1c168b3b91f464e67bc8bc44cf66f8e8c37c94cbab1abc01afbdb700299ea8908f94f0fceb5c5484d180f76024813eb213fc8f01ef9b57d2158c6831aa373783995b0e84fdfdfb7a5048679bd2c32bba5763fcc15143d3d18166f752390bbb3c3fc0ee660b9a412be819af0"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:36:28 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) close(r1) 10:36:28 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x2d, 'io'}, {0x2d, 'pids'}]}, 0xa) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:36:28 executing program 1: 10:36:28 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00\f\x00', 0x4009}) 10:36:28 executing program 0: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x0, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:36:28 executing program 1: 10:36:28 executing program 1: 10:36:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0xa8}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 3110.337806][T23996] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3110.346046][T23996] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:36:28 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) close(0xffffffffffffffff) 10:36:28 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) close(r1) 10:36:28 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x2d, 'io'}, {0x2d, 'pids'}]}, 0xa) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) [ 3110.700026][T24016] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3110.708748][T24016] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:36:37 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x01\f\x00', 0x4009}) 10:36:37 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) close(0xffffffffffffffff) 10:36:37 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7947c101e4600800000efff065900001943449fc1dcf86e0008d70000000000c6b5af027400005822e8f98b2b4077445b2fef3efddc547d08d3f4215a73e8d9ffcd60ac4807eafef8078a0f219e25e2a0e0a729aa6d43bc1107b9cf2a89a797cd5c578f0000000000000000000000000000000000000056a62e5a1aa8fb8856e1e0333a81dc43d3baea26962ade38deb5629dd4dabb0f32ba9b6ca4d5c2247c1621b8a5f49fbf922256de3b9579ae270980003cabc10d38e4ffd7bd80080f53ca9e4127035460328f4b77e121254b0313a191ec0dc15a949dd272f38d32e06f864aa93a0cf2df860a36f952717c788e5617a566440e22cddb2310acdf7d25b3f00d49b8b87ceb3d9eb49e58aa8fb3638d4036905bbf66c3b0de83568bdd2e8afdf6f80600000000000000000000000000000000000000b2d980d9714429b928c4b9eeff737a645fea18800d9e1d97e28c593694a0bec53608bcbed51d99987ead09b639bb9f7c6300ae0d556d16334413a8a80e440a3c5e89734ba69bdb6b63c89e777bebae18c0b6ee92260506989430696df40dc6a1c168b3b91f464e67bc8bc44cf66f8e8c37c94cbab1abc01afbdb700299ea8908f94f0fceb5c5484d180f76024813eb213fc8f01ef9b57d2158c6831aa373783995b0e84fdfdfb7a5048679bd2c32bba5763fcc15143d3d18166f752390bbb3c3fc0ee660b9a412be819af0"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:36:37 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x2d, 'io'}, {0x2d, 'pids'}]}, 0xa) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:36:37 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) close(r1) [ 3119.597574][T24030] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3119.605852][T24030] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:36:39 executing program 0: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x0, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:36:39 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) close(0xffffffffffffffff) 10:36:39 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\xf5\x0f\x00', 0x4009}) 10:36:39 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7947c101e4600800000efff065900001943449fc1dcf86e0008d70000000000c6b5af027400005822e8f98b2b4077445b2fef3efddc547d08d3f4215a73e8d9ffcd60ac4807eafef8078a0f219e25e2a0e0a729aa6d43bc1107b9cf2a89a797cd5c578f0000000000000000000000000000000000000056a62e5a1aa8fb8856e1e0333a81dc43d3baea26962ade38deb5629dd4dabb0f32ba9b6ca4d5c2247c1621b8a5f49fbf922256de3b9579ae270980003cabc10d38e4ffd7bd80080f53ca9e4127035460328f4b77e121254b0313a191ec0dc15a949dd272f38d32e06f864aa93a0cf2df860a36f952717c788e5617a566440e22cddb2310acdf7d25b3f00d49b8b87ceb3d9eb49e58aa8fb3638d4036905bbf66c3b0de83568bdd2e8afdf6f80600000000000000000000000000000000000000b2d980d9714429b928c4b9eeff737a645fea18800d9e1d97e28c593694a0bec53608bcbed51d99987ead09b639bb9f7c6300ae0d556d16334413a8a80e440a3c5e89734ba69bdb6b63c89e777bebae18c0b6ee92260506989430696df40dc6a1c168b3b91f464e67bc8bc44cf66f8e8c37c94cbab1abc01afbdb700299ea8908f94f0fceb5c5484d180f76024813eb213fc8f01ef9b57d2158c6831aa373783995b0e84fdfdfb7a5048679bd2c32bba5763fcc15143d3d18166f752390bbb3c3fc0ee660b9a412be819af0"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:36:39 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(0xffffffffffffffff) 10:36:39 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) close(0xffffffffffffffff) [ 3121.592594][T24048] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3121.602143][T24048] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:36:40 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:36:40 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00\x1f\x00', 0x4009}) [ 3121.844901][T24066] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3121.887771][T24066] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:36:49 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:36:49 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:36:49 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(0xffffffffffffffff) 10:36:49 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:36:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0xd8}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:36:49 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00 \x00', 0x4009}) 10:36:49 executing program 1: bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0) [ 3130.874759][T24086] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3130.889800][T24086] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:36:49 executing program 1: bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0) 10:36:49 executing program 1: bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0) 10:36:49 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7947c101e4600800000efff065900001943449fc1dcf86e0008d70000000000c6b5af027400005822e8f98b2b4077445b2fef3efddc547d08d3f4215a73e8d9ffcd60ac4807eafef8078a0f219e25e2a0e0a729aa6d43bc1107b9cf2a89a797cd5c578f0000000000000000000000000000000000000056a62e5a1aa8fb8856e1e0333a81dc43d3baea26962ade38deb5629dd4dabb0f32ba9b6ca4d5c2247c1621b8a5f49fbf922256de3b9579ae270980003cabc10d38e4ffd7bd80080f53ca9e4127035460328f4b77e121254b0313a191ec0dc15a949dd272f38d32e06f864aa93a0cf2df860a36f952717c788e5617a566440e22cddb2310acdf7d25b3f00d49b8b87ceb3d9eb49e58aa8fb3638d4036905bbf66c3b0de83568bdd2e8afdf6f80600000000000000000000000000000000000000b2d980d9714429b928c4b9eeff737a645fea18800d9e1d97e28c593694a0bec53608bcbed51d99987ead09b639bb9f7c6300ae0d556d16334413a8a80e440a3c5e89734ba69bdb6b63c89e777bebae18c0b6ee92260506989430696df40dc6a1c168b3b91f464e67bc8bc44cf66f8e8c37c94cbab1abc01afbdb700299ea8908f94f0fceb5c5484d180f76024813eb213fc8f01ef9b57d2158c6831aa373783995b0e84fdfdfb7a5048679bd2c32bba5763fcc15143d3d18166f752390bbb3c3fc0ee660b9a412be819af0"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, 0x0, 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:36:49 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(0xffffffffffffffff) 10:36:49 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3131.191831][T24109] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3131.212464][T24109] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:36:58 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:36:58 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:36:58 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x88 \x00', 0x4009}) 10:36:58 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, 0x0, 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:36:58 executing program 3: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7947c101e4600800000efff065900001943449fc1dcf86e0008d70000000000c6b5af027400005822e8f98b2b4077445b2fef3efddc547d08d3f4215a73e8d9ffcd60ac4807eafef8078a0f219e25e2a0e0a729aa6d43bc1107b9cf2a89a797cd5c578f0000000000000000000000000000000000000056a62e5a1aa8fb8856e1e0333a81dc43d3baea26962ade38deb5629dd4dabb0f32ba9b6ca4d5c2247c1621b8a5f49fbf922256de3b9579ae270980003cabc10d38e4ffd7bd80080f53ca9e4127035460328f4b77e121254b0313a191ec0dc15a949dd272f38d32e06f864aa93a0cf2df860a36f952717c788e5617a566440e22cddb2310acdf7d25b3f00d49b8b87ceb3d9eb49e58aa8fb3638d4036905bbf66c3b0de83568bdd2e8afdf6f80600000000000000000000000000000000000000b2d980d9714429b928c4b9eeff737a645fea18800d9e1d97e28c593694a0bec53608bcbed51d99987ead09b639bb9f7c6300ae0d556d16334413a8a80e440a3c5e89734ba69bdb6b63c89e777bebae18c0b6ee92260506989430696df40dc6a1c168b3b91f464e67bc8bc44cf66f8e8c37c94cbab1abc01afbdb700299ea8908f94f0fceb5c5484d180f76024813eb213fc8f01ef9b57d2158c6831aa373783995b0e84fdfdfb7a5048679bd2c32bba5763fcc15143d3d18166f752390bbb3c3fc0ee660b9a412be819af0"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x2d, 'io'}, {0x2d, 'pids'}]}, 0xa) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:36:58 executing program 0: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) 10:36:58 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:36:58 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:36:58 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3140.257319][T24134] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3140.274016][T24134] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3140.283624][T24141] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 10:36:58 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x02,\x00', 0x4009}) [ 3140.307209][T24141] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 10:36:58 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:36:58 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, 0x0, 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) [ 3140.641131][T24154] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3140.662721][T24154] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:37:13 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7947c101e4600800000efff065900001943449fc1dcf86e0008d70000000000c6b5af027400005822e8f98b2b4077445b2fef3efddc547d08d3f4215a73e8d9ffcd60ac4807eafef8078a0f219e25e2a0e0a729aa6d43bc1107b9cf2a89a797cd5c578f0000000000000000000000000000000000000056a62e5a1aa8fb8856e1e0333a81dc43d3baea26962ade38deb5629dd4dabb0f32ba9b6ca4d5c2247c1621b8a5f49fbf922256de3b9579ae270980003cabc10d38e4ffd7bd80080f53ca9e4127035460328f4b77e121254b0313a191ec0dc15a949dd272f38d32e06f864aa93a0cf2df860a36f952717c788e5617a566440e22cddb2310acdf7d25b3f00d49b8b87ceb3d9eb49e58aa8fb3638d4036905bbf66c3b0de83568bdd2e8afdf6f80600000000000000000000000000000000000000b2d980d9714429b928c4b9eeff737a645fea18800d9e1d97e28c593694a0bec53608bcbed51d99987ead09b639bb9f7c6300ae0d556d16334413a8a80e440a3c5e89734ba69bdb6b63c89e777bebae18c0b6ee92260506989430696df40dc6a1c168b3b91f464e67bc8bc44cf66f8e8c37c94cbab1abc01afbdb700299ea8908f94f0fceb5c5484d180f76024813eb213fc8f01ef9b57d2158c6831aa373783995b0e84fdfdfb7a5048679bd2c32bba5763fcc15143d3d18166f752390bbb3c3fc0ee660b9a412be819af0"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:37:13 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:37:13 executing program 3: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, 0x0) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:37:13 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, 0x0, 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:37:13 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x028\x00', 0x4009}) 10:37:13 executing program 0: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) 10:37:13 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:37:14 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3155.681845][T24182] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3155.705000][T24182] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3155.720063][T24171] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 10:37:14 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:37:14 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00?\x00', 0x4009}) [ 3155.783587][T24171] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 10:37:14 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:37:14 executing program 3: 10:37:23 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:37:23 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, 0x0, 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:37:23 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:37:23 executing program 3: 10:37:23 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00@\x00', 0x4009}) [ 3164.883661][T24219] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3164.895418][T24219] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:37:29 executing program 0: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) 10:37:29 executing program 3: 10:37:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff030}, {0x6}]}) 10:37:29 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, 0x0, 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:37:29 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00H\x00', 0x4009}) 10:37:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4}}]}}, &(0x7f0000000080)=""/221, 0x32, 0xdd, 0x8}, 0x20) [ 3171.010343][T24238] BPF:[1] ARRAY (anon) [ 3171.023970][T24238] BPF:type_id=4 index_type_id=0 nr_elems=0 [ 3171.026916][T24230] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3171.035193][T24238] BPF: [ 3171.043513][T24230] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3171.050234][T24238] BPF:Invalid index [ 3171.055617][T24238] BPF: [ 3171.055617][T24238] 10:37:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x4c00, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000002b00050ad25a80648c6356c10224fc0004000b4015000400050082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 3171.063464][T24238] BPF:[1] ARRAY (anon) [ 3171.067732][T24238] BPF:type_id=4 index_type_id=0 nr_elems=0 [ 3171.073529][T24238] BPF: [ 3171.076447][T24238] BPF:Invalid index [ 3171.080747][T24238] BPF: [ 3171.080747][T24238] 10:37:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x4c00, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000002b00050ad25a80648c6356c10224fc0004000b4015000400050082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 10:37:36 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:37:36 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002", 0x17}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:37:36 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00J\x00', 0x4009}) 10:37:36 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) [ 3178.251005][T24257] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3178.259811][T24257] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3178.270689][T24256] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3178.280492][T24256] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:37:44 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7947c101e4600800000efff065900001943449fc1dcf86e0008d70000000000c6b5af027400005822e8f98b2b4077445b2fef3efddc547d08d3f4215a73e8d9ffcd60ac4807eafef8078a0f219e25e2a0e0a729aa6d43bc1107b9cf2a89a797cd5c578f0000000000000000000000000000000000000056a62e5a1aa8fb8856e1e0333a81dc43d3baea26962ade38deb5629dd4dabb0f32ba9b6ca4d5c2247c1621b8a5f49fbf922256de3b9579ae270980003cabc10d38e4ffd7bd80080f53ca9e4127035460328f4b77e121254b0313a191ec0dc15a949dd272f38d32e06f864aa93a0cf2df860a36f952717c788e5617a566440e22cddb2310acdf7d25b3f00d49b8b87ceb3d9eb49e58aa8fb3638d4036905bbf66c3b0de83568bdd2e8afdf6f80600000000000000000000000000000000000000b2d980d9714429b928c4b9eeff737a645fea18800d9e1d97e28c593694a0bec53608bcbed51d99987ead09b639bb9f7c6300ae0d556d16334413a8a80e440a3c5e89734ba69bdb6b63c89e777bebae18c0b6ee92260506989430696df40dc6a1c168b3b91f464e67bc8bc44cf66f8e8c37c94cbab1abc01afbdb700299ea8908f94f0fceb5c5484d180f76024813eb213fc8f01ef9b57d2158c6831aa373783995b0e84fdfdfb7a5048679bd2c32bba5763fcc15143d3d18166f752390bbb3c3fc0ee660b9a412be819af0"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:37:44 executing program 0: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:37:44 executing program 3: socket$kcm(0x2b, 0x1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) 10:37:44 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00L\x00', 0x4009}) 10:37:44 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) [ 3186.554766][T24274] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3186.563609][T24274] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3186.580686][T24282] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3186.595477][T24282] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 10:37:45 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:37:45 executing program 3: socket$kcm(0x2b, 0x1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) 10:37:45 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) [ 3186.875841][T24291] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3186.888748][T24291] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3187.004117][T24296] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3187.012617][T24296] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 10:37:45 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7947c101e4600800000efff065900001943449fc1dcf86e0008d70000000000c6b5af027400005822e8f98b2b4077445b2fef3efddc547d08d3f4215a73e8d9ffcd60ac4807eafef8078a0f219e25e2a0e0a729aa6d43bc1107b9cf2a89a797cd5c578f0000000000000000000000000000000000000056a62e5a1aa8fb8856e1e0333a81dc43d3baea26962ade38deb5629dd4dabb0f32ba9b6ca4d5c2247c1621b8a5f49fbf922256de3b9579ae270980003cabc10d38e4ffd7bd80080f53ca9e4127035460328f4b77e121254b0313a191ec0dc15a949dd272f38d32e06f864aa93a0cf2df860a36f952717c788e5617a566440e22cddb2310acdf7d25b3f00d49b8b87ceb3d9eb49e58aa8fb3638d4036905bbf66c3b0de83568bdd2e8afdf6f80600000000000000000000000000000000000000b2d980d9714429b928c4b9eeff737a645fea18800d9e1d97e28c593694a0bec53608bcbed51d99987ead09b639bb9f7c6300ae0d556d16334413a8a80e440a3c5e89734ba69bdb6b63c89e777bebae18c0b6ee92260506989430696df40dc6a1c168b3b91f464e67bc8bc44cf66f8e8c37c94cbab1abc01afbdb700299ea8908f94f0fceb5c5484d180f76024813eb213fc8f01ef9b57d2158c6831aa373783995b0e84fdfdfb7a5048679bd2c32bba5763fcc15143d3d18166f752390bbb3c3fc0ee660b9a412be819af0"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 10:37:45 executing program 3: socket$kcm(0x2b, 0x1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) 10:37:45 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, 0xffffffffffffffff, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:37:45 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x01V\x00', 0x4009}) 10:37:45 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002", 0x17}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) [ 3187.493782][T24317] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3187.506219][T24317] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:37:58 executing program 0: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:37:58 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 10:37:58 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00`\x00', 0x4009}) 10:37:58 executing program 3: socket$kcm(0x2b, 0x1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) close(r0) 10:37:58 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 10:37:58 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002", 0x17}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) [ 3199.981541][T24335] validate_nla: 2 callbacks suppressed [ 3199.981584][T24335] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3199.995958][T24335] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3200.012123][T24332] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3200.021154][T24332] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:37:58 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 10:37:58 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00h\x00', 0x4009}) 10:37:58 executing program 3: socket$kcm(0x2b, 0x1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) close(r0) 10:37:58 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0x0, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) [ 3200.253905][T24346] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3200.262642][T24346] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3200.399239][T24355] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3200.408672][T24355] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 10:37:58 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:37:58 executing program 3: socket$kcm(0x2b, 0x1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) close(r0) [ 3200.661900][T24362] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3200.675437][T24362] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:38:11 executing program 0: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:38:11 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0x0, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:38:11 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00l\x00', 0x4009}) 10:38:11 executing program 3: socket$kcm(0x2b, 0x1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) 10:38:11 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000340), 0x4) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@datasec={0x0, 0x1, 0x0, 0x7, 0x1, [{}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x42, 0xf9, 0x8}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x7) close(r2) 10:38:11 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e", 0x23}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7947c101e4600800000efff065900001943449fc1dcf86e0008d70000000000c6b5af027400005822e8f98b2b4077445b2fef3efddc547d08d3f4215a73e8d9ffcd60ac4807eafef8078a0f219e25e2a0e0a729aa6d43bc1107b9cf2a89a797cd5c578f0000000000000000000000000000000000000056a62e5a1aa8fb8856e1e0333a81dc43d3baea26962ade38deb5629dd4dabb0f32ba9b6ca4d5c2247c1621b8a5f49fbf922256de3b9579ae270980003cabc10d38e4ffd7bd80080f53ca9e4127035460328f4b77e121254b0313a191ec0dc15a949dd272f38d32e06f864aa93a0cf2df860a36f952717c788e5617a566440e22cddb2310acdf7d25b3f00d49b8b87ceb3d9eb49e58aa8fb3638d4036905bbf66c3b0de83568bdd2e8afdf6f80600000000000000000000000000000000000000b2d980d9714429b928c4b9eeff737a645fea18800d9e1d97e28c593694a0bec53608bcbed51d99987ead09b639bb9f7c6300ae0d556d16334413a8a80e440a3c5e89734ba69bdb6b63c89e777bebae18c0b6ee92260506989430696df40dc6a1c168b3b91f464e67bc8bc44cf66f8e8c37c94cbab1abc01afbdb700299ea8908f94f0fceb5c5484d180f76024813eb213fc8f01ef9b57d2158c6831aa373783995b0e84fdfdfb7a5048679bd2c32bba5763fcc15143d3d18166f752390bbb3c3fc0ee660b9a412be819af0"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:38:11 executing program 3: socket$kcm(0x2b, 0x1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) [ 3213.368758][T24379] BPF:[1] FWD (anon) [ 3213.372936][T24379] BPF:struct [ 3213.372944][T24379] BPF: [ 3213.372950][T24379] BPF:vlen != 0 [ 3213.372955][T24379] BPF: [ 3213.372955][T24379] 10:38:11 executing program 3: socket$kcm(0x2b, 0x1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) [ 3213.483608][T24383] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3213.501203][T24383] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 10:38:11 executing program 3: socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x20) close(0xffffffffffffffff) 10:38:11 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7947c101e4600800000efff065900001943449fc1dcf86e0008d70000000000c6b5af027400005822e8f98b2b4077445b2fef3efddc547d08d3f4215a73e8d9ffcd60ac4807eafef8078a0f219e25e2a0e0a729aa6d43bc1107b9cf2a89a797cd5c578f0000000000000000000000000000000000000056a62e5a1aa8fb8856e1e0333a81dc43d3baea26962ade38deb5629dd4dabb0f32ba9b6ca4d5c2247c1621b8a5f49fbf922256de3b9579ae270980003cabc10d38e4ffd7bd80080f53ca9e4127035460328f4b77e121254b0313a191ec0dc15a949dd272f38d32e06f864aa93a0cf2df860a36f952717c788e5617a566440e22cddb2310acdf7d25b3f00d49b8b87ceb3d9eb49e58aa8fb3638d4036905bbf66c3b0de83568bdd2e8afdf6f80600000000000000000000000000000000000000b2d980d9714429b928c4b9eeff737a645fea18800d9e1d97e28c593694a0bec53608bcbed51d99987ead09b639bb9f7c6300ae0d556d16334413a8a80e440a3c5e89734ba69bdb6b63c89e777bebae18c0b6ee92260506989430696df40dc6a1c168b3b91f464e67bc8bc44cf66f8e8c37c94cbab1abc01afbdb700299ea8908f94f0fceb5c5484d180f76024813eb213fc8f01ef9b57d2158c6831aa373783995b0e84fdfdfb7a5048679bd2c32bba5763fcc15143d3d18166f752390bbb3c3fc0ee660b9a412be819af0"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:38:11 executing program 3: socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x20) close(0xffffffffffffffff) 10:38:12 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000040)=r2) ioctl$TUNSETLINK(r1, 0x400454cd, 0x7) socketpair(0x4, 0x4, 0x0, &(0x7f0000000080)) r3 = openat$cgroup(r2, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) close(r1) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(r4, 0x0, 0x200002, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000540), 0x4}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f00000002c0)=0xa7) write$cgroup_subtree(r6, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000000500)) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8o\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r7 = perf_event_open(&(0x7f0000000300)={0x6, 0x70, 0x2, 0x1f, 0x0, 0xff, 0x0, 0x3, 0x5360c, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x64b5, 0x6, @perf_bp={&(0x7f00000002c0), 0x9}, 0x20004, 0x8, 0x9, 0x0, 0x1, 0x2}, 0xffffffffffffffff, 0xb, r5, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f00000003c0)={0x1, 0x70, 0x8, 0x80, 0x80, 0x6, 0x0, 0x682f, 0x22040, 0x1c, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x6, @perf_bp={&(0x7f0000000380), 0x2}, 0x0, 0x1, 0x5, 0x7, 0x0, 0xec5, 0xf801}) r8 = perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x70, 0x7f, 0x4, 0xff, 0x66, 0x0, 0xf10, 0x60, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000001c0), 0x9}, 0x4180, 0x6, 0x7, 0x4, 0x10000, 0x5, 0xc5}, r4, 0xe, 0xffffffffffffffff, 0x0) r9 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) sendmsg$kcm(r10, &(0x7f00000002c0)={&(0x7f0000000680)=@in6={0xa, 0x4e23, 0x4, @loopback, 0x2}, 0x80, &(0x7f0000001c80)=[{&(0x7f0000000780)="7fd6d6417f6150c2a1dfcc67d28fd7c9fb390cbc9c24140207eb3d93523b348c4619f5e9791ae1f1d3a5d8b4eda942ee53b303252babdfa1c879525aa2cb8125168556e5a8ce433cd89669bf9f25ceb4cbdef27a933c921cc9a0d0db629eccb43718b85169aa83cef4ed44c143c432ca6f7f195d280d1d9298351aa14a15a0555d27ef20e395bd1683a213c5bc00503b51338849bcb5f1bb785350f0dba1db8a20fe2fecdf5e7c8820a009db828c0c7cd7f519dff1527b2bda651e35b683917687da7f70acad85f9426c4ee147f81e", 0xcf}, {&(0x7f0000000440)="e4cbdc4b2d0613b1b7053a4958176d343d8055cffaae650a673405aac83288af332511373996ecd1e9e5119a4144c455f7756003bde97294a85f4482f27f0b2a65425e8cd7c309fd3f173ffc3fe98b380d9d8e845ff4ca2a", 0x58}, {&(0x7f0000000880)="5ac7056a2d4378d6938aee6593cb3ed2a109b6dcad497162ec12bbbccfc4a367331ee4a7c4092aeb9c52dddd66b1aebe4957691a2ec8567de13a613190d095e66f795e1059fea361487be90bcace0455a5fd9325da26b3dcc343dcb09af202ef8ba098c9f4e09d", 0x67}, {&(0x7f0000000900)="a47722998a4c81a2eb4068042d8c9887dadd270ca4acec07da59a4b1e9efeb098be04067d0d797abeb868741aec90b33516d4358277992443692ddd42dc1ce573bec1177da431658813323836812a19f9e182ab17453b4d3e5e3e23c032830e78dc15e1c17074147ac4d77c83fec77ea0716c47ac8592bec7f5ce48f2311722df705e9f52994abed66dba141316d11a4767f99251a183075c9468b056a522b049185e590e27d934ef599a66e82a7a34bcf6e3d7c1d1254c890712428e864cc5dc15e7c7aa593e6039eba7d06888c3c5ff3bdaace843e961352a226eb647a92", 0xdf}, {0x0}, {&(0x7f0000000700)="605888c8268e3ef7f8a6da1b496e29ebab1b095f46846808f980fcc9ffc0b89696a1373c2da2eaa8c0d6334ef33101e5b24abad2ab46b0d55bfef0", 0x3b}, {&(0x7f0000000a00)="bc4031660dcbfea099744f60c1ba5aee4c7a56036f4278f02b2147e3c70885e72fba0f6f9ab5766f15113bc069cd110c457f6cdeb5c5e0f918a6c3c92328866c62114f6eab9457cb5470ee6e3fbe1516b4b451", 0x53}, {&(0x7f0000000a80)="29efd74253cee67f0a8967d849bc67a87fbf530cd5fe5a3c7ce3af774292c868d678dab84eb1d9547da6145d445489926fc70c07d46a7a1b4a12119c80", 0x3d}], 0x8}, 0x40004) ioctl$TUNGETVNETHDRSZ(r10, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r10, 0x0, 0xf800000000000000) r11 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x10, r10, 0x1) r12 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0xccd, 0x0, 0x3, 0x0, 0x1f, 0x1000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xd}, 0x0, 0x40000000000000, 0x3, 0x3}, r12, 0xe, r11, 0xa6f54f15e4426112) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r13, 0x4030582a, &(0x7f0000000040)) r14 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x3cd, 0x0, 0xccd, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x3}, r14, 0x0, 0xffffffffffffffff, 0x0) r15 = perf_event_open(&(0x7f0000001640)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x80, 0x200a4, 0x4d3493a797b2afc4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xcc34, 0x1, @perf_config_ext={0x0, 0x1fe000000000}, 0x42000, 0x0, 0x2, 0x0, 0x2, 0x403, 0x20}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001900)={r16, 0xc0, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=0x10001}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000740)={r14, r15, 0x0, 0xffffffed, &(0x7f0000000340)='em1cgroup/\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={r12, r13, 0x0, 0x1a, &(0x7f0000000640)='cpuacct.usage_percpu_user\x00', r17}, 0x30) r19 = perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r19) ioctl$PERF_EVENT_IOC_SET_FILTER(r19, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8o\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') perf_event_open(&(0x7f00000005c0)={0x5, 0x70, 0x6, 0xc4, 0x9, 0x13, 0x0, 0x1ff, 0x4, 0xc, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000580), 0x2}, 0x18000, 0x2, 0x4, 0x5, 0x4, 0x8, 0x1}, r18, 0xe, r19, 0x3) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r8, 0xc008240a, &(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00']) [ 3213.854089][T24410] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3213.875734][T24410] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3223.827541][T24418] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 3223.835790][T24418] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 10:38:22 executing program 0: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:38:22 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00t\x00', 0x4009}) 10:38:22 executing program 3: socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x20) close(0xffffffffffffffff) 10:38:22 executing program 1: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x80, 0x8, 0x40, 0x38, 0x0, 0xfff, 0x84208, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x8fe, 0x7}, 0x1000, 0xd7a, 0x6, 0x2, 0xffffbfff00000001, 0x4, 0x4}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x70, 0x7, 0x70, 0x1, 0x2, 0x0, 0x3ff, 0x10005, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x1000, 0x6}, 0x35585, 0x1, 0x0, 0x8, 0x85, 0xffff, 0xea00}, 0xffffffffffffffff, 0x4, r0, 0xc) r1 = perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8o\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x81) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x7) socket$kcm(0x29, 0x5, 0x0) close(r2) 10:38:22 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0x0, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:38:22 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e", 0x23}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:38:22 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) [ 3224.071678][T24427] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3224.098563][T24427] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:38:22 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000040)) close(r1) 10:38:22 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00z\x00', 0x4009}) 10:38:22 executing program 3: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) 10:38:22 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)='(+\x00'}, 0x30) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000001c0)={0x7, &(0x7f0000000180)=[{0x8000, 0xce, 0x80, 0x6}, {0x20, 0x72, 0x80, 0x1}, {0x400, 0xfa, 0x0, 0xc55}, {0x2, 0x5, 0x81, 0x7fff}, {0x2, 0x7f, 0x7, 0x4}, {0x7, 0x4, 0x1f, 0x692}, {0xfffd, 0x0, 0xff}]}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x7) r4 = perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8o\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000000c0)='\x00') close(r1) 10:38:22 executing program 3: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) 10:38:31 executing program 0: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:38:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) 10:38:31 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x01\xf4\x00', 0x4009}) 10:38:31 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:38:31 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:38:31 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e", 0x23}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:38:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) 10:38:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) [ 3233.348136][T24479] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3233.368329][T24479] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3233.386059][T24478] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 10:38:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) 10:38:31 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x0f\xf5\x00', 0x4009}) [ 3233.473163][T24478] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:38:31 executing program 1 (fault-call:4 fault-nth:0): r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:38:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) [ 3233.713282][T24492] FAULT_INJECTION: forcing a failure. [ 3233.713282][T24492] name failslab, interval 1, probability 0, space 0, times 0 [ 3233.736866][T24492] CPU: 0 PID: 24492 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 3233.745269][T24492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3233.755316][T24492] Call Trace: [ 3233.755356][T24492] dump_stack+0x197/0x210 [ 3233.755382][T24492] should_fail.cold+0xa/0x15 [ 3233.755406][T24492] ? fault_create_debugfs_attr+0x180/0x180 [ 3233.773377][T24492] ? ___might_sleep+0x163/0x2c0 [ 3233.778265][T24492] __should_failslab+0x121/0x190 [ 3233.783225][T24492] should_failslab+0x9/0x14 [ 3233.787731][T24492] kmem_cache_alloc+0x2aa/0x710 [ 3233.792579][T24492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3233.798830][T24492] ? debug_smp_processor_id+0x33/0x18a [ 3233.804314][T24492] getname_flags+0xd6/0x5b0 [ 3233.808853][T24492] do_mkdirat+0xa0/0x2a0 [ 3233.813105][T24492] ? __ia32_sys_mknod+0xb0/0xb0 [ 3233.815249][T24496] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3233.817979][T24492] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3233.817995][T24492] ? do_syscall_64+0x26/0x790 [ 3233.818021][T24492] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3233.818040][T24492] ? do_syscall_64+0x26/0x790 [ 3233.826224][T24496] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3233.831563][T24492] __x64_sys_mkdirat+0x76/0xb0 [ 3233.831581][T24492] do_syscall_64+0xfa/0x790 [ 3233.831602][T24492] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3233.831613][T24492] RIP: 0033:0x45a679 [ 3233.831628][T24492] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3233.831634][T24492] RSP: 002b:00007fabee582c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3233.902471][T24492] RAX: ffffffffffffffda RBX: 00007fabee582c90 RCX: 000000000045a679 [ 3233.910439][T24492] RDX: 00000000000001ff RSI: 0000000020000700 RDI: ffffffffffffff9c [ 3233.918390][T24492] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3233.926431][T24492] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fabee5836d4 [ 3233.934382][T24492] R13: 00000000004c781e R14: 00000000004de500 R15: 0000000000000004 [ 3247.815593][T24506] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 3247.824123][T24506] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 10:38:46 executing program 0 (fault-call:5 fault-nth:0): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) 10:38:46 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) 10:38:46 executing program 2 (fault-call:0 fault-nth:0): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:38:46 executing program 1 (fault-call:4 fault-nth:1): r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:38:46 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\xff\xfe\x00', 0x4009}) 10:38:46 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000", 0x29}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) [ 3248.111547][T24516] FAULT_INJECTION: forcing a failure. [ 3248.111547][T24516] name failslab, interval 1, probability 0, space 0, times 0 [ 3248.126273][T24516] CPU: 1 PID: 24516 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3248.134628][T24516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3248.142252][T24518] FAULT_INJECTION: forcing a failure. [ 3248.142252][T24518] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3248.145046][T24516] Call Trace: [ 3248.161528][T24516] dump_stack+0x197/0x210 [ 3248.165873][T24516] should_fail.cold+0xa/0x15 [ 3248.170459][T24516] ? fault_create_debugfs_attr+0x180/0x180 [ 3248.176273][T24516] ? ___might_sleep+0x163/0x2c0 [ 3248.181120][T24516] __should_failslab+0x121/0x190 [ 3248.186195][T24516] should_failslab+0x9/0x14 [ 3248.190699][T24516] kmem_cache_alloc_node_trace+0x274/0x750 [ 3248.196505][T24516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3248.202777][T24516] ? cap_capable+0x205/0x270 [ 3248.207364][T24516] __kmalloc_node+0x3d/0x70 [ 3248.211893][T24516] __bpf_map_area_alloc+0xbd/0xf0 [ 3248.216912][T24516] bpf_map_area_alloc+0x20/0x30 [ 3248.221841][T24516] array_map_alloc+0x4bc/0x7d0 [ 3248.226603][T24516] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3248.232243][T24516] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3248.238480][T24516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3248.244811][T24516] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3248.250445][T24516] __do_sys_bpf+0x478/0x37b0 [ 3248.255029][T24516] ? bpf_prog_load+0x18a0/0x18a0 [ 3248.259965][T24516] ? __kasan_check_write+0x14/0x20 [ 3248.265080][T24516] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3248.270626][T24516] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3248.275912][T24516] ? wait_for_completion+0x440/0x440 [ 3248.281210][T24516] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3248.287454][T24516] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3248.292924][T24516] ? do_syscall_64+0x26/0x790 [ 3248.297597][T24516] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3248.303653][T24516] ? do_syscall_64+0x26/0x790 [ 3248.308573][T24516] __x64_sys_bpf+0x73/0xb0 [ 3248.313009][T24516] do_syscall_64+0xfa/0x790 [ 3248.317512][T24516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3248.323520][T24516] RIP: 0033:0x45a679 [ 3248.327407][T24516] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3248.347009][T24516] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3248.355408][T24516] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3248.363485][T24516] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3248.371458][T24516] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3248.379433][T24516] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3248.387541][T24516] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3248.395532][T24518] CPU: 0 PID: 24518 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 3248.403998][T24518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3248.414046][T24518] Call Trace: [ 3248.414069][T24518] dump_stack+0x197/0x210 [ 3248.414089][T24518] should_fail.cold+0xa/0x15 [ 3248.414107][T24518] ? fault_create_debugfs_attr+0x180/0x180 [ 3248.414121][T24518] ? __kasan_check_read+0x11/0x20 [ 3248.414133][T24518] ? __lock_acquire+0x16f2/0x4a00 [ 3248.414154][T24518] should_fail_alloc_page+0x50/0x60 [ 3248.421844][T24518] __alloc_pages_nodemask+0x1a1/0x910 [ 3248.421861][T24518] ? retint_kernel+0x2b/0x2b [ 3248.421878][T24518] ? trace_hardirqs_on_caller+0x6a/0x240 [ 3248.421895][T24518] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3248.421916][T24518] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3248.432308][T24518] ? fault_create_debugfs_attr+0x180/0x180 [ 3248.432331][T24518] cache_grow_begin+0x90/0xd00 [ 3248.432348][T24518] ? getname_flags+0xd6/0x5b0 [ 3248.432364][T24518] ? trace_hardirqs_off+0x62/0x240 [ 3248.432383][T24518] kmem_cache_alloc+0x64e/0x710 [ 3248.432405][T24518] getname_flags+0xd6/0x5b0 [ 3248.442538][T24518] do_mkdirat+0xa0/0x2a0 [ 3248.442558][T24518] ? __ia32_sys_mknod+0xb0/0xb0 [ 3248.442576][T24518] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3248.442591][T24518] ? do_syscall_64+0x26/0x790 [ 3248.442614][T24518] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3248.453165][T24518] ? do_syscall_64+0x26/0x790 [ 3248.453190][T24518] __x64_sys_mkdirat+0x76/0xb0 [ 3248.453208][T24518] do_syscall_64+0xfa/0x790 [ 3248.453235][T24518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3248.463418][T24518] RIP: 0033:0x45a679 [ 3248.463433][T24518] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3248.463441][T24518] RSP: 002b:00007fabee582c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3248.463455][T24518] RAX: ffffffffffffffda RBX: 00007fabee582c90 RCX: 000000000045a679 [ 3248.463463][T24518] RDX: 00000000000001ff RSI: 0000000020000700 RDI: ffffffffffffff9c [ 3248.463471][T24518] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 10:38:46 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) [ 3248.463480][T24518] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fabee5836d4 [ 3248.463487][T24518] R13: 00000000004c781e R14: 00000000004de500 R15: 0000000000000004 [ 3248.518048][T24518] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3248.524298][T24518] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 10:38:46 executing program 2 (fault-call:0 fault-nth:1): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:38:47 executing program 1 (fault-call:4 fault-nth:2): r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7947c101e4600800000efff065900001943449fc1dcf86e0008d70000000000c6b5af027400005822e8f98b2b4077445b2fef3efddc547d08d3f4215a73e8d9ffcd60ac4807eafef8078a0f219e25e2a0e0a729aa6d43bc1107b9cf2a89a797cd5c578f0000000000000000000000000000000000000056a62e5a1aa8fb8856e1e0333a81dc43d3baea26962ade38deb5629dd4dabb0f32ba9b6ca4d5c2247c1621b8a5f49fbf922256de3b9579ae270980003cabc10d38e4ffd7bd80080f53ca9e4127035460328f4b77e121254b0313a191ec0dc15a949dd272f38d32e06f864aa93a0cf2df860a36f952717c788e5617a566440e22cddb2310acdf7d25b3f00d49b8b87ceb3d9eb49e58aa8fb3638d4036905bbf66c3b0de83568bdd2e8afdf6f80600000000000000000000000000000000000000b2d980d9714429b928c4b9eeff737a645fea18800d9e1d97e28c593694a0bec53608bcbed51d99987ead09b639bb9f7c6300ae0d556d16334413a8a80e440a3c5e89734ba69bdb6b63c89e777bebae18c0b6ee92260506989430696df40dc6a1c168b3b91f464e67bc8bc44cf66f8e8c37c94cbab1abc01afbdb700299ea8908f94f0fceb5c5484d180f76024813eb213fc8f01ef9b57d2158c6831aa373783995b0e84fdfdfb7a5048679bd2c32bba5763fcc15143d3d18166f752390bbb3c3fc0ee660b9a412be819af0"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:38:47 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) [ 3248.742486][T24527] FAULT_INJECTION: forcing a failure. [ 3248.742486][T24527] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3248.769805][T24527] CPU: 0 PID: 24527 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3248.778184][T24527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3248.788241][T24527] Call Trace: [ 3248.791532][T24527] dump_stack+0x197/0x210 [ 3248.795863][T24527] should_fail.cold+0xa/0x15 [ 3248.800468][T24527] ? fault_create_debugfs_attr+0x180/0x180 [ 3248.806285][T24527] ? ___might_sleep+0x163/0x2c0 [ 3248.811146][T24527] should_fail_alloc_page+0x50/0x60 [ 3248.816332][T24527] __alloc_pages_nodemask+0x1a1/0x910 [ 3248.823106][T24527] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3248.828843][T24527] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3248.835105][T24527] ? find_next_bit+0x107/0x130 [ 3248.839888][T24527] pcpu_populate_chunk+0xf8/0x940 [ 3248.844918][T24527] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3248.850645][T24527] ? find_next_bit+0xc7/0x130 [ 3248.855343][T24527] pcpu_alloc+0xd5b/0x1380 [ 3248.859772][T24527] ? pcpu_alloc_area+0x820/0x820 [ 3248.864728][T24527] __alloc_percpu_gfp+0x28/0x30 [ 3248.869581][T24527] array_map_alloc+0x698/0x7d0 [ 3248.874619][T24527] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3248.880264][T24527] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3248.886508][T24527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3248.892757][T24527] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3248.898391][T24527] __do_sys_bpf+0x478/0x37b0 [ 3248.903012][T24527] ? bpf_prog_load+0x18a0/0x18a0 [ 3248.907957][T24527] ? __kasan_check_write+0x14/0x20 [ 3248.913069][T24527] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3248.913087][T24527] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3248.913101][T24527] ? wait_for_completion+0x440/0x440 [ 3248.913122][T24527] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3248.919718][T24535] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3248.923937][T24527] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3248.923953][T24527] ? do_syscall_64+0x26/0x790 [ 3248.923976][T24527] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3248.940535][T24535] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3248.943632][T24527] ? do_syscall_64+0x26/0x790 [ 3248.943655][T24527] __x64_sys_bpf+0x73/0xb0 [ 3248.943675][T24527] do_syscall_64+0xfa/0x790 [ 3248.981455][T24527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3248.987354][T24527] RIP: 0033:0x45a679 10:38:47 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) 10:38:47 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) [ 3248.991255][T24527] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3249.010865][T24527] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3249.019287][T24527] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3249.027268][T24527] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3249.035241][T24527] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3249.035250][T24527] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3249.035259][T24527] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 10:38:55 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) 10:38:55 executing program 2 (fault-call:0 fault-nth:2): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:38:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x20) close(r0) 10:38:55 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:38:55 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\xfe\xff\x00', 0x4009}) 10:38:55 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000", 0x29}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) [ 3257.358289][T24560] FAULT_INJECTION: forcing a failure. [ 3257.358289][T24560] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3257.377571][T24560] CPU: 1 PID: 24560 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3257.385937][T24560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3257.396014][T24560] Call Trace: [ 3257.399317][T24560] dump_stack+0x197/0x210 [ 3257.403646][T24560] should_fail.cold+0xa/0x15 [ 3257.409721][T24560] ? fault_create_debugfs_attr+0x180/0x180 [ 3257.415518][T24560] ? ___might_sleep+0x163/0x2c0 [ 3257.420388][T24560] should_fail_alloc_page+0x50/0x60 [ 3257.425576][T24560] __alloc_pages_nodemask+0x1a1/0x910 [ 3257.431079][T24560] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3257.436799][T24560] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3257.443350][T24560] ? find_next_bit+0x107/0x130 [ 3257.448125][T24560] pcpu_populate_chunk+0xf8/0x940 [ 3257.453188][T24560] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3257.459108][T24560] ? find_next_bit+0xc7/0x130 [ 3257.463786][T24560] pcpu_alloc+0xd5b/0x1380 [ 3257.468219][T24560] ? pcpu_alloc_area+0x820/0x820 [ 3257.473429][T24560] __alloc_percpu_gfp+0x28/0x30 [ 3257.478287][T24560] array_map_alloc+0x698/0x7d0 [ 3257.483063][T24560] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3257.488702][T24560] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3257.494946][T24560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3257.501195][T24560] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3257.506841][T24560] __do_sys_bpf+0x478/0x37b0 [ 3257.511448][T24560] ? bpf_prog_load+0x18a0/0x18a0 [ 3257.516374][T24560] ? __kasan_check_write+0x14/0x20 [ 3257.521494][T24560] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3257.527032][T24560] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3257.532319][T24560] ? wait_for_completion+0x440/0x440 [ 3257.537606][T24560] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3257.543989][T24560] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3257.549440][T24560] ? do_syscall_64+0x26/0x790 [ 3257.554119][T24560] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3257.560182][T24560] ? do_syscall_64+0x26/0x790 [ 3257.564852][T24560] __x64_sys_bpf+0x73/0xb0 [ 3257.569263][T24560] do_syscall_64+0xfa/0x790 [ 3257.573759][T24560] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3257.579636][T24560] RIP: 0033:0x45a679 [ 3257.583527][T24560] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:38:55 executing program 2 (fault-call:0 fault-nth:3): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3257.603126][T24560] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3257.611519][T24560] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3257.619475][T24560] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3257.627426][T24560] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3257.635380][T24560] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3257.643332][T24560] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3257.729328][T24570] FAULT_INJECTION: forcing a failure. [ 3257.729328][T24570] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3257.743844][T24570] CPU: 1 PID: 24570 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3257.752193][T24570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3257.754179][T24564] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3257.762246][T24570] Call Trace: [ 3257.762271][T24570] dump_stack+0x197/0x210 [ 3257.762296][T24570] should_fail.cold+0xa/0x15 [ 3257.762316][T24570] ? fault_create_debugfs_attr+0x180/0x180 [ 3257.762336][T24570] ? ___might_sleep+0x163/0x2c0 [ 3257.775478][T24564] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3257.778007][T24570] should_fail_alloc_page+0x50/0x60 [ 3257.778025][T24570] __alloc_pages_nodemask+0x1a1/0x910 [ 3257.778047][T24570] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3257.778070][T24570] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3257.778084][T24570] ? find_next_bit+0x107/0x130 [ 3257.778109][T24570] pcpu_populate_chunk+0xf8/0x940 [ 3257.833588][T24570] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3257.839300][T24570] ? find_next_bit+0xc7/0x130 [ 3257.843999][T24570] pcpu_alloc+0xd5b/0x1380 [ 3257.848448][T24570] ? pcpu_alloc_area+0x820/0x820 [ 3257.853570][T24570] __alloc_percpu_gfp+0x28/0x30 [ 3257.858634][T24570] array_map_alloc+0x698/0x7d0 [ 3257.863407][T24570] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3257.869036][T24570] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3257.875282][T24570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3257.881534][T24570] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3257.887278][T24570] __do_sys_bpf+0x478/0x37b0 [ 3257.891876][T24570] ? bpf_prog_load+0x18a0/0x18a0 [ 3257.896822][T24570] ? __kasan_check_write+0x14/0x20 [ 3257.901941][T24570] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3257.907590][T24570] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3257.912875][T24570] ? wait_for_completion+0x440/0x440 [ 3257.918156][T24570] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3257.924390][T24570] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3257.929835][T24570] ? do_syscall_64+0x26/0x790 [ 3257.934500][T24570] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3257.940562][T24570] ? do_syscall_64+0x26/0x790 [ 3257.945225][T24570] __x64_sys_bpf+0x73/0xb0 [ 3257.949627][T24570] do_syscall_64+0xfa/0x790 [ 3257.954215][T24570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3257.960088][T24570] RIP: 0033:0x45a679 [ 3257.963991][T24570] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3257.984939][T24570] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3257.993343][T24570] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3258.001298][T24570] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3258.009251][T24570] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3258.017206][T24570] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 10:38:56 executing program 2 (fault-call:0 fault-nth:4): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3258.025174][T24570] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3258.087864][T24574] FAULT_INJECTION: forcing a failure. [ 3258.087864][T24574] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3258.111697][T24574] CPU: 1 PID: 24574 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3258.120063][T24574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3258.130124][T24574] Call Trace: [ 3258.133429][T24574] dump_stack+0x197/0x210 10:38:56 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='//cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) [ 3258.137781][T24574] should_fail.cold+0xa/0x15 [ 3258.142392][T24574] ? fault_create_debugfs_attr+0x180/0x180 [ 3258.148202][T24574] ? ___might_sleep+0x163/0x2c0 [ 3258.153054][T24574] should_fail_alloc_page+0x50/0x60 [ 3258.158256][T24574] __alloc_pages_nodemask+0x1a1/0x910 [ 3258.163639][T24574] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3258.169374][T24574] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3258.175616][T24574] ? find_next_bit+0x107/0x130 [ 3258.180394][T24574] pcpu_populate_chunk+0xf8/0x940 [ 3258.185428][T24574] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3258.191154][T24574] ? find_next_bit+0xc7/0x130 [ 3258.195851][T24574] pcpu_alloc+0xd5b/0x1380 [ 3258.200286][T24574] ? pcpu_alloc_area+0x820/0x820 [ 3258.205246][T24574] __alloc_percpu_gfp+0x28/0x30 [ 3258.210281][T24574] array_map_alloc+0x698/0x7d0 [ 3258.215061][T24574] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3258.219687][T24581] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3258.220708][T24574] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3258.220728][T24574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3258.233405][T24581] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3258.235009][T24574] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3258.235028][T24574] __do_sys_bpf+0x478/0x37b0 [ 3258.235045][T24574] ? bpf_prog_load+0x18a0/0x18a0 [ 3258.235065][T24574] ? __kasan_check_write+0x14/0x20 [ 3258.269907][T24574] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3258.275438][T24574] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3258.280720][T24574] ? wait_for_completion+0x440/0x440 [ 3258.286009][T24574] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3258.292258][T24574] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3258.297695][T24574] ? do_syscall_64+0x26/0x790 [ 3258.302620][T24574] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3258.308667][T24574] ? do_syscall_64+0x26/0x790 [ 3258.313329][T24574] __x64_sys_bpf+0x73/0xb0 [ 3258.317829][T24574] do_syscall_64+0xfa/0x790 [ 3258.322328][T24574] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3258.328197][T24574] RIP: 0033:0x45a679 [ 3258.332072][T24574] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3258.351666][T24574] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3258.360077][T24574] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3258.368041][T24574] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3258.375994][T24574] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 10:38:56 executing program 2 (fault-call:0 fault-nth:5): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3258.383951][T24574] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3258.391924][T24574] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 10:38:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x20) close(r0) [ 3258.455848][T24585] FAULT_INJECTION: forcing a failure. [ 3258.455848][T24585] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3258.472864][T24585] CPU: 0 PID: 24585 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3258.481220][T24585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3258.491280][T24585] Call Trace: [ 3258.494583][T24585] dump_stack+0x197/0x210 [ 3258.498929][T24585] should_fail.cold+0xa/0x15 [ 3258.503537][T24585] ? fault_create_debugfs_attr+0x180/0x180 [ 3258.509350][T24585] ? ___might_sleep+0x163/0x2c0 [ 3258.514227][T24585] should_fail_alloc_page+0x50/0x60 [ 3258.519431][T24585] __alloc_pages_nodemask+0x1a1/0x910 [ 3258.519456][T24585] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3258.519481][T24585] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3258.519498][T24585] ? find_next_bit+0x107/0x130 [ 3258.530582][T24585] pcpu_populate_chunk+0xf8/0x940 [ 3258.530604][T24585] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3258.530618][T24585] ? find_next_bit+0xc7/0x130 [ 3258.530640][T24585] pcpu_alloc+0xd5b/0x1380 [ 3258.530662][T24585] ? pcpu_alloc_area+0x820/0x820 [ 3258.530687][T24585] __alloc_percpu_gfp+0x28/0x30 [ 3258.530703][T24585] array_map_alloc+0x698/0x7d0 [ 3258.530721][T24585] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3258.530738][T24585] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3258.530756][T24585] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3258.594201][T24585] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3258.599846][T24585] __do_sys_bpf+0x478/0x37b0 [ 3258.604624][T24585] ? bpf_prog_load+0x18a0/0x18a0 [ 3258.609557][T24585] ? __kasan_check_write+0x14/0x20 [ 3258.614662][T24585] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3258.620202][T24585] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3258.625481][T24585] ? wait_for_completion+0x440/0x440 [ 3258.630766][T24585] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3258.637013][T24585] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3258.642466][T24585] ? do_syscall_64+0x26/0x790 [ 3258.647133][T24585] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3258.653182][T24585] ? do_syscall_64+0x26/0x790 [ 3258.657859][T24585] __x64_sys_bpf+0x73/0xb0 [ 3258.662267][T24585] do_syscall_64+0xfa/0x790 [ 3258.666777][T24585] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3258.672782][T24585] RIP: 0033:0x45a679 [ 3258.676672][T24585] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3258.696324][T24585] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3258.704739][T24585] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3258.712721][T24585] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3258.720694][T24585] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3258.728666][T24585] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3258.736736][T24585] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 10:38:57 executing program 2 (fault-call:0 fault-nth:6): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3258.787560][T24577] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3258.795732][T24577] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3258.834525][T24594] FAULT_INJECTION: forcing a failure. [ 3258.834525][T24594] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3258.863121][T24594] CPU: 1 PID: 24594 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3258.871479][T24594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3258.881528][T24594] Call Trace: [ 3258.881552][T24594] dump_stack+0x197/0x210 [ 3258.881577][T24594] should_fail.cold+0xa/0x15 [ 3258.881600][T24594] ? fault_create_debugfs_attr+0x180/0x180 [ 3258.889201][T24594] ? ___might_sleep+0x163/0x2c0 [ 3258.889229][T24594] should_fail_alloc_page+0x50/0x60 [ 3258.889246][T24594] __alloc_pages_nodemask+0x1a1/0x910 [ 3258.889266][T24594] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3258.889289][T24594] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3258.889301][T24594] ? find_next_bit+0x107/0x130 [ 3258.889322][T24594] pcpu_populate_chunk+0xf8/0x940 [ 3258.937160][T24594] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3258.942881][T24594] ? find_next_bit+0xc7/0x130 [ 3258.947562][T24594] pcpu_alloc+0xd5b/0x1380 [ 3258.951971][T24594] ? pcpu_alloc_area+0x820/0x820 [ 3258.956923][T24594] __alloc_percpu_gfp+0x28/0x30 [ 3258.961777][T24594] array_map_alloc+0x698/0x7d0 [ 3258.966550][T24594] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3258.972181][T24594] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3258.978603][T24594] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3258.984832][T24594] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3258.990466][T24594] __do_sys_bpf+0x478/0x37b0 [ 3258.995139][T24594] ? bpf_prog_load+0x18a0/0x18a0 [ 3259.000076][T24594] ? __kasan_check_write+0x14/0x20 [ 3259.005181][T24594] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3259.010991][T24594] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3259.016260][T24594] ? wait_for_completion+0x440/0x440 [ 3259.021530][T24594] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3259.030533][T24594] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3259.035978][T24594] ? do_syscall_64+0x26/0x790 [ 3259.040648][T24594] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3259.046708][T24594] ? do_syscall_64+0x26/0x790 [ 3259.051372][T24594] __x64_sys_bpf+0x73/0xb0 [ 3259.055815][T24594] do_syscall_64+0xfa/0x790 [ 3259.060306][T24594] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3259.066176][T24594] RIP: 0033:0x45a679 [ 3259.070052][T24594] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3259.089643][T24594] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3259.098077][T24594] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3259.106047][T24594] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3259.114002][T24594] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3259.122314][T24594] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3259.130278][T24594] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 10:39:04 executing program 2 (fault-call:0 fault-nth:7): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:39:04 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x1}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000000c0)) 10:39:04 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\xb7p\x01\x00', 0x4009}) 10:39:04 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./.group.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:39:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x20) close(r0) 10:39:04 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000", 0x29}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) [ 3266.619710][T24608] FAULT_INJECTION: forcing a failure. [ 3266.619710][T24608] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3266.633112][T24608] CPU: 1 PID: 24608 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3266.641450][T24608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3266.651509][T24608] Call Trace: [ 3266.654795][T24608] dump_stack+0x197/0x210 [ 3266.659145][T24608] should_fail.cold+0xa/0x15 [ 3266.663754][T24608] ? fault_create_debugfs_attr+0x180/0x180 [ 3266.669669][T24608] ? ___might_sleep+0x163/0x2c0 [ 3266.674547][T24608] should_fail_alloc_page+0x50/0x60 [ 3266.679754][T24608] __alloc_pages_nodemask+0x1a1/0x910 [ 3266.685145][T24608] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3266.690887][T24608] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3266.697137][T24608] ? find_next_bit+0x107/0x130 [ 3266.701923][T24608] pcpu_populate_chunk+0xf8/0x940 [ 3266.706975][T24608] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3266.708017][T24612] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3266.712696][T24608] ? find_next_bit+0xc7/0x130 [ 3266.712718][T24608] pcpu_alloc+0xd5b/0x1380 [ 3266.712740][T24608] ? pcpu_alloc_area+0x820/0x820 [ 3266.726738][T24612] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3266.729876][T24608] __alloc_percpu_gfp+0x28/0x30 [ 3266.729895][T24608] array_map_alloc+0x698/0x7d0 [ 3266.729916][T24608] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3266.729941][T24608] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3266.729956][T24608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3266.729971][T24608] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3266.729986][T24608] __do_sys_bpf+0x478/0x37b0 [ 3266.730008][T24608] ? bpf_prog_load+0x18a0/0x18a0 [ 3266.785694][T24608] ? __kasan_check_write+0x14/0x20 [ 3266.790812][T24608] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3266.796365][T24608] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3266.801661][T24608] ? wait_for_completion+0x440/0x440 [ 3266.806950][T24608] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3266.813207][T24608] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3266.818660][T24608] ? do_syscall_64+0x26/0x790 [ 3266.823349][T24608] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3266.829435][T24608] ? do_syscall_64+0x26/0x790 [ 3266.834103][T24608] __x64_sys_bpf+0x73/0xb0 [ 3266.838510][T24608] do_syscall_64+0xfa/0x790 [ 3266.843019][T24608] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3266.848904][T24608] RIP: 0033:0x45a679 10:39:05 executing program 2 (fault-call:0 fault-nth:8): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3266.852871][T24608] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3266.872456][T24608] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3266.880874][T24608] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3266.888851][T24608] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3266.896829][T24608] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3266.904989][T24608] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3266.912982][T24608] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3266.978096][T24620] FAULT_INJECTION: forcing a failure. [ 3266.978096][T24620] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3267.004051][T24620] CPU: 1 PID: 24620 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3267.012461][T24620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3267.018662][T24606] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3267.022518][T24620] Call Trace: [ 3267.022542][T24620] dump_stack+0x197/0x210 [ 3267.022567][T24620] should_fail.cold+0xa/0x15 [ 3267.022589][T24620] ? fault_create_debugfs_attr+0x180/0x180 [ 3267.022603][T24620] ? ___might_sleep+0x163/0x2c0 [ 3267.022627][T24620] should_fail_alloc_page+0x50/0x60 [ 3267.045624][T24606] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3267.048666][T24620] __alloc_pages_nodemask+0x1a1/0x910 [ 3267.048689][T24620] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3267.048714][T24620] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3267.048727][T24620] ? find_next_bit+0x107/0x130 [ 3267.048745][T24620] pcpu_populate_chunk+0xf8/0x940 [ 3267.048758][T24620] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3267.048770][T24620] ? find_next_bit+0xc7/0x130 [ 3267.048790][T24620] pcpu_alloc+0xd5b/0x1380 [ 3267.048811][T24620] ? pcpu_alloc_area+0x820/0x820 [ 3267.048838][T24620] __alloc_percpu_gfp+0x28/0x30 [ 3267.048856][T24620] array_map_alloc+0x698/0x7d0 10:39:05 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='.//group.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) [ 3267.048874][T24620] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3267.048889][T24620] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3267.048903][T24620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3267.048923][T24620] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3267.048940][T24620] __do_sys_bpf+0x478/0x37b0 [ 3267.048959][T24620] ? bpf_prog_load+0x18a0/0x18a0 [ 3267.048972][T24620] ? __kasan_check_write+0x14/0x20 [ 3267.048987][T24620] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3267.049003][T24620] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3267.049019][T24620] ? wait_for_completion+0x440/0x440 [ 3267.049046][T24620] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3267.184256][T24620] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3267.189744][T24620] ? do_syscall_64+0x26/0x790 [ 3267.194465][T24620] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3267.200542][T24620] ? do_syscall_64+0x26/0x790 [ 3267.205232][T24620] __x64_sys_bpf+0x73/0xb0 [ 3267.209662][T24620] do_syscall_64+0xfa/0x790 [ 3267.214176][T24620] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3267.214697][T24624] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3267.220059][T24620] RIP: 0033:0x45a679 [ 3267.220076][T24620] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3267.220084][T24620] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3267.220096][T24620] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3267.220105][T24620] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 10:39:05 executing program 2 (fault-call:0 fault-nth:9): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3267.220112][T24620] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3267.220121][T24620] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3267.220129][T24620] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3267.235480][T24624] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3267.409921][T24631] FAULT_INJECTION: forcing a failure. [ 3267.409921][T24631] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3267.425593][T24631] CPU: 0 PID: 24631 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3267.433943][T24631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3267.444096][T24631] Call Trace: [ 3267.447387][T24631] dump_stack+0x197/0x210 [ 3267.451876][T24631] should_fail.cold+0xa/0x15 [ 3267.456466][T24631] ? fault_create_debugfs_attr+0x180/0x180 [ 3267.462256][T24631] ? ___might_sleep+0x163/0x2c0 [ 3267.467108][T24631] should_fail_alloc_page+0x50/0x60 [ 3267.472304][T24631] __alloc_pages_nodemask+0x1a1/0x910 [ 3267.477669][T24631] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3267.483381][T24631] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3267.489611][T24631] ? find_next_bit+0x107/0x130 [ 3267.494366][T24631] pcpu_populate_chunk+0xf8/0x940 [ 3267.499378][T24631] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3267.505079][T24631] ? find_next_bit+0xc7/0x130 [ 3267.509753][T24631] pcpu_alloc+0xd5b/0x1380 [ 3267.514310][T24631] ? pcpu_alloc_area+0x820/0x820 [ 3267.519306][T24631] __alloc_percpu_gfp+0x28/0x30 [ 3267.524144][T24631] array_map_alloc+0x698/0x7d0 [ 3267.529049][T24631] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3267.534670][T24631] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3267.540906][T24631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3267.547146][T24631] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3267.552780][T24631] __do_sys_bpf+0x478/0x37b0 [ 3267.557369][T24631] ? bpf_prog_load+0x18a0/0x18a0 [ 3267.562289][T24631] ? __kasan_check_write+0x14/0x20 [ 3267.567385][T24631] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3267.572925][T24631] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3267.578210][T24631] ? wait_for_completion+0x440/0x440 [ 3267.583490][T24631] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3267.589865][T24631] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3267.595332][T24631] ? do_syscall_64+0x26/0x790 [ 3267.600019][T24631] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3267.606078][T24631] ? do_syscall_64+0x26/0x790 [ 3267.610753][T24631] __x64_sys_bpf+0x73/0xb0 [ 3267.615150][T24631] do_syscall_64+0xfa/0x790 [ 3267.619635][T24631] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3267.625504][T24631] RIP: 0033:0x45a679 [ 3267.629376][T24631] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3267.648965][T24631] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 10:39:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) close(r0) 10:39:06 executing program 2 (fault-call:0 fault-nth:10): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3267.657372][T24631] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3267.665431][T24631] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3267.673411][T24631] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3267.681373][T24631] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3267.689330][T24631] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3267.795674][T24640] FAULT_INJECTION: forcing a failure. [ 3267.795674][T24640] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3267.820633][T24640] CPU: 0 PID: 24640 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3267.829003][T24640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3267.839054][T24640] Call Trace: [ 3267.842334][T24640] dump_stack+0x197/0x210 [ 3267.846651][T24640] should_fail.cold+0xa/0x15 [ 3267.851247][T24640] ? fault_create_debugfs_attr+0x180/0x180 [ 3267.857040][T24640] ? ___might_sleep+0x163/0x2c0 [ 3267.862146][T24640] should_fail_alloc_page+0x50/0x60 [ 3267.867331][T24640] __alloc_pages_nodemask+0x1a1/0x910 [ 3267.873299][T24640] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3267.879269][T24640] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3267.885575][T24640] ? find_next_bit+0x107/0x130 [ 3267.890328][T24640] pcpu_populate_chunk+0xf8/0x940 [ 3267.895334][T24640] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3267.901031][T24640] ? find_next_bit+0xc7/0x130 [ 3267.905693][T24640] pcpu_alloc+0xd5b/0x1380 [ 3267.910100][T24640] ? pcpu_alloc_area+0x820/0x820 [ 3267.915035][T24640] __alloc_percpu_gfp+0x28/0x30 [ 3267.919867][T24640] array_map_alloc+0x698/0x7d0 [ 3267.924614][T24640] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3267.930231][T24640] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3267.936452][T24640] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3267.942674][T24640] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3267.948292][T24640] __do_sys_bpf+0x478/0x37b0 [ 3267.952882][T24640] ? bpf_prog_load+0x18a0/0x18a0 [ 3267.957847][T24640] ? __kasan_check_write+0x14/0x20 [ 3267.962944][T24640] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3267.968471][T24640] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3267.973757][T24640] ? wait_for_completion+0x440/0x440 [ 3267.979029][T24640] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3267.985269][T24640] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3267.990722][T24640] ? do_syscall_64+0x26/0x790 [ 3267.995383][T24640] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3268.001430][T24640] ? do_syscall_64+0x26/0x790 [ 3268.006095][T24640] __x64_sys_bpf+0x73/0xb0 [ 3268.010499][T24640] do_syscall_64+0xfa/0x790 [ 3268.014987][T24640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3268.020868][T24640] RIP: 0033:0x45a679 [ 3268.024749][T24640] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3268.044346][T24640] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3268.052739][T24640] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3268.060690][T24640] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3268.068643][T24640] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3268.076597][T24640] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3268.084552][T24640] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 10:39:06 executing program 2 (fault-call:0 fault-nth:11): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3268.152727][T24645] FAULT_INJECTION: forcing a failure. [ 3268.152727][T24645] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3268.166247][T24645] CPU: 0 PID: 24645 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3268.174576][T24645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3268.184625][T24645] Call Trace: [ 3268.187911][T24645] dump_stack+0x197/0x210 [ 3268.192254][T24645] should_fail.cold+0xa/0x15 [ 3268.196841][T24645] ? fault_create_debugfs_attr+0x180/0x180 [ 3268.202640][T24645] ? ___might_sleep+0x163/0x2c0 [ 3268.207491][T24645] should_fail_alloc_page+0x50/0x60 [ 3268.212686][T24645] __alloc_pages_nodemask+0x1a1/0x910 [ 3268.218061][T24645] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3268.223772][T24645] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3268.229995][T24645] ? find_next_bit+0x107/0x130 [ 3268.234747][T24645] pcpu_populate_chunk+0xf8/0x940 [ 3268.239756][T24645] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3268.245471][T24645] ? find_next_bit+0xc7/0x130 [ 3268.250152][T24645] pcpu_alloc+0xd5b/0x1380 [ 3268.254558][T24645] ? pcpu_alloc_area+0x820/0x820 [ 3268.259487][T24645] __alloc_percpu_gfp+0x28/0x30 [ 3268.264320][T24645] array_map_alloc+0x698/0x7d0 [ 3268.269067][T24645] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3268.274688][T24645] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3268.280907][T24645] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3268.287128][T24645] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3268.292757][T24645] __do_sys_bpf+0x478/0x37b0 [ 3268.297333][T24645] ? bpf_prog_load+0x18a0/0x18a0 [ 3268.302261][T24645] ? __kasan_check_write+0x14/0x20 [ 3268.307354][T24645] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3268.312882][T24645] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3268.318149][T24645] ? wait_for_completion+0x440/0x440 [ 3268.323432][T24645] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3268.329672][T24645] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3268.335115][T24645] ? do_syscall_64+0x26/0x790 [ 3268.339777][T24645] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3268.345828][T24645] ? do_syscall_64+0x26/0x790 [ 3268.350488][T24645] __x64_sys_bpf+0x73/0xb0 [ 3268.354890][T24645] do_syscall_64+0xfa/0x790 [ 3268.359378][T24645] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3268.365247][T24645] RIP: 0033:0x45a679 [ 3268.369124][T24645] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3268.388707][T24645] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 10:39:06 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup/net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) [ 3268.397107][T24645] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3268.405069][T24645] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3268.413021][T24645] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3268.420987][T24645] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3268.428944][T24645] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 10:39:06 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\xb8p\x01\x00', 0x4009}) [ 3268.619630][T24649] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3268.628319][T24649] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3268.755999][T24649] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3268.765355][T24649] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 10:39:16 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) close(r0) 10:39:16 executing program 2 (fault-call:0 fault-nth:12): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:39:16 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\xb9p\x01\x00', 0x4009}) [ 3277.993001][T24672] FAULT_INJECTION: forcing a failure. [ 3277.993001][T24672] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3278.006593][T24672] CPU: 0 PID: 24672 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3278.015047][T24672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3278.015054][T24672] Call Trace: [ 3278.015076][T24672] dump_stack+0x197/0x210 [ 3278.015107][T24672] should_fail.cold+0xa/0x15 [ 3278.028435][T24672] ? fault_create_debugfs_attr+0x180/0x180 [ 3278.028452][T24672] ? ___might_sleep+0x163/0x2c0 [ 3278.028478][T24672] should_fail_alloc_page+0x50/0x60 [ 3278.028493][T24672] __alloc_pages_nodemask+0x1a1/0x910 [ 3278.028515][T24672] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3278.037400][T24672] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3278.037415][T24672] ? find_next_bit+0x107/0x130 [ 3278.037436][T24672] pcpu_populate_chunk+0xf8/0x940 [ 3278.037450][T24672] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3278.037462][T24672] ? find_next_bit+0xc7/0x130 [ 3278.037481][T24672] pcpu_alloc+0xd5b/0x1380 [ 3278.037503][T24672] ? pcpu_alloc_area+0x820/0x820 [ 3278.048133][T24672] __alloc_percpu_gfp+0x28/0x30 [ 3278.048151][T24672] array_map_alloc+0x698/0x7d0 [ 3278.048171][T24672] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3278.048191][T24672] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3278.048202][T24672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3278.048220][T24672] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3278.058749][T24672] __do_sys_bpf+0x478/0x37b0 [ 3278.058770][T24672] ? bpf_prog_load+0x18a0/0x18a0 [ 3278.058786][T24672] ? __kasan_check_write+0x14/0x20 [ 3278.058802][T24672] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3278.058817][T24672] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3278.058841][T24672] ? wait_for_completion+0x440/0x440 [ 3278.070768][T24672] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3278.070798][T24672] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3278.070817][T24672] ? do_syscall_64+0x26/0x790 [ 3278.070834][T24672] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3278.070847][T24672] ? do_syscall_64+0x26/0x790 [ 3278.070867][T24672] __x64_sys_bpf+0x73/0xb0 [ 3278.080614][T24672] do_syscall_64+0xfa/0x790 [ 3278.080641][T24672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3278.080653][T24672] RIP: 0033:0x45a679 [ 3278.080668][T24672] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3278.080676][T24672] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3278.080690][T24672] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3278.080703][T24672] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3278.091051][T24672] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3278.091060][T24672] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3278.091068][T24672] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 10:39:23 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700", 0x2c}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7947c101e4600800000efff065900001943449fc1dcf86e0008d70000000000c6b5af027400005822e8f98b2b4077445b2fef3efddc547d08d3f4215a73e8d9ffcd60ac4807eafef8078a0f219e25e2a0e0a729aa6d43bc1107b9cf2a89a797cd5c578f0000000000000000000000000000000000000056a62e5a1aa8fb8856e1e0333a81dc43d3baea26962ade38deb5629dd4dabb0f32ba9b6ca4d5c2247c1621b8a5f49fbf922256de3b9579ae270980003cabc10d38e4ffd7bd80080f53ca9e4127035460328f4b77e121254b0313a191ec0dc15a949dd272f38d32e06f864aa93a0cf2df860a36f952717c788e5617a566440e22cddb2310acdf7d25b3f00d49b8b87ceb3d9eb49e58aa8fb3638d4036905bbf66c3b0de83568bdd2e8afdf6f80600000000000000000000000000000000000000b2d980d9714429b928c4b9eeff737a645fea18800d9e1d97e28c593694a0bec53608bcbed51d99987ead09b639bb9f7c6300ae0d556d16334413a8a80e440a3c5e89734ba69bdb6b63c89e777bebae18c0b6ee92260506989430696df40dc6a1c168b3b91f464e67bc8bc44cf66f8e8c37c94cbab1abc01afbdb700299ea8908f94f0fceb5c5484d180f76024813eb213fc8f01ef9b57d2158c6831aa373783995b0e84fdfdfb7a5048679bd2c32bba5763fcc15143d3d18166f752390bbb3c3fc0ee660b9a412be819af0"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:39:23 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) close(r0) 10:39:23 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'cc\t\x00\x00\x00\x00\x00\xef\xff\x00\x00\x00\xff\x7f\x00', 0xcb50bf145903b4a8}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x20) r4 = socket$kcm(0x29, 0x2, 0x0) r5 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x3cd, 0x0, 0xccd, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x3}, r5, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000001640)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x80, 0x200a4, 0x4d3493a797b2afc4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xcc34, 0x1, @perf_config_ext={0x0, 0x1fe000000000}, 0x42000, 0x0, 0x2, 0x0, 0x2, 0x403, 0x20}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001900)={r7, 0xc0, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=0x10001}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001940)={r5, r6, 0x0, 0xb, &(0x7f0000000340)='em1cgroup/\x00', r8}, 0x30) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f00000000c0)={r1, r9}) close(r2) 10:39:23 executing program 2 (fault-call:0 fault-nth:13): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:39:23 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\xbap\x01\x00', 0x4009}) 10:39:23 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup..et//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7947c101e4600800000efff065900001943449fc1dcf86e0008d70000000000c6b5af027400005822e8f98b2b4077445b2fef3efddc547d08d3f4215a73e8d9ffcd60ac4807eafef8078a0f219e25e2a0e0a729aa6d43bc1107b9cf2a89a797cd5c578f0000000000000000000000000000000000000056a62e5a1aa8fb8856e1e0333a81dc43d3baea26962ade38deb5629dd4dabb0f32ba9b6ca4d5c2247c1621b8a5f49fbf922256de3b9579ae270980003cabc10d38e4ffd7bd80080f53ca9e4127035460328f4b77e121254b0313a191ec0dc15a949dd272f38d32e06f864aa93a0cf2df860a36f952717c788e5617a566440e22cddb2310acdf7d25b3f00d49b8b87ceb3d9eb49e58aa8fb3638d4036905bbf66c3b0de83568bdd2e8afdf6f80600000000000000000000000000000000000000b2d980d9714429b928c4b9eeff737a645fea18800d9e1d97e28c593694a0bec53608bcbed51d99987ead09b639bb9f7c6300ae0d556d16334413a8a80e440a3c5e89734ba69bdb6b63c89e777bebae18c0b6ee92260506989430696df40dc6a1c168b3b91f464e67bc8bc44cf66f8e8c37c94cbab1abc01afbdb700299ea8908f94f0fceb5c5484d180f76024813eb213fc8f01ef9b57d2158c6831aa373783995b0e84fdfdfb7a5048679bd2c32bba5763fcc15143d3d18166f752390bbb3c3fc0ee660b9a412be819af0"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) [ 3285.474217][T24688] FAULT_INJECTION: forcing a failure. [ 3285.474217][T24688] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3285.494646][T24688] CPU: 1 PID: 24688 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3285.503050][T24688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3285.513108][T24688] Call Trace: [ 3285.516392][T24688] dump_stack+0x197/0x210 [ 3285.520730][T24688] should_fail.cold+0xa/0x15 [ 3285.525308][T24688] ? fault_create_debugfs_attr+0x180/0x180 [ 3285.531100][T24688] ? ___might_sleep+0x163/0x2c0 [ 3285.536117][T24688] should_fail_alloc_page+0x50/0x60 [ 3285.541312][T24688] __alloc_pages_nodemask+0x1a1/0x910 [ 3285.546699][T24688] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3285.552415][T24688] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3285.558645][T24688] ? find_next_bit+0x107/0x130 [ 3285.563529][T24688] pcpu_populate_chunk+0xf8/0x940 [ 3285.568550][T24688] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3285.574260][T24688] ? find_next_bit+0xc7/0x130 [ 3285.578927][T24688] pcpu_alloc+0xd5b/0x1380 [ 3285.583334][T24688] ? pcpu_alloc_area+0x820/0x820 [ 3285.588263][T24688] __alloc_percpu_gfp+0x28/0x30 [ 3285.593100][T24688] array_map_alloc+0x698/0x7d0 [ 3285.597850][T24688] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3285.603557][T24688] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3285.609777][T24688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3285.616158][T24688] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3285.621784][T24688] __do_sys_bpf+0x478/0x37b0 [ 3285.626527][T24688] ? bpf_prog_load+0x18a0/0x18a0 [ 3285.631459][T24688] ? __kasan_check_write+0x14/0x20 [ 3285.636567][T24688] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3285.642242][T24688] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3285.647527][T24688] ? wait_for_completion+0x440/0x440 [ 3285.652822][T24688] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3285.659072][T24688] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3285.664521][T24688] ? do_syscall_64+0x26/0x790 [ 3285.669189][T24688] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3285.675245][T24688] ? do_syscall_64+0x26/0x790 [ 3285.679915][T24688] __x64_sys_bpf+0x73/0xb0 [ 3285.684329][T24688] do_syscall_64+0xfa/0x790 [ 3285.688825][T24688] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3285.694817][T24688] RIP: 0033:0x45a679 [ 3285.698701][T24688] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3285.718391][T24688] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3285.726797][T24688] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3285.734756][T24688] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3285.742716][T24688] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3285.750675][T24688] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3285.758661][T24688] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 10:39:24 executing program 2 (fault-call:0 fault-nth:14): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3285.773668][T24693] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3285.801504][T24693] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3285.861962][T24698] FAULT_INJECTION: forcing a failure. [ 3285.861962][T24698] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3285.877163][T24698] CPU: 0 PID: 24698 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3285.885507][T24698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3285.896024][T24698] Call Trace: [ 3285.899470][T24698] dump_stack+0x197/0x210 [ 3285.903815][T24698] should_fail.cold+0xa/0x15 [ 3285.908493][T24698] ? fault_create_debugfs_attr+0x180/0x180 [ 3285.914295][T24698] ? ___might_sleep+0x163/0x2c0 [ 3285.919239][T24698] should_fail_alloc_page+0x50/0x60 [ 3285.924525][T24698] __alloc_pages_nodemask+0x1a1/0x910 [ 3285.929899][T24698] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3285.935638][T24698] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3285.941884][T24698] ? find_next_bit+0x107/0x130 [ 3285.946659][T24698] pcpu_populate_chunk+0xf8/0x940 [ 3285.951678][T24698] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3285.957456][T24698] ? find_next_bit+0xc7/0x130 [ 3285.962253][T24698] pcpu_alloc+0xd5b/0x1380 [ 3285.966686][T24698] ? pcpu_alloc_area+0x820/0x820 [ 3285.971738][T24698] __alloc_percpu_gfp+0x28/0x30 [ 3285.976620][T24698] array_map_alloc+0x698/0x7d0 [ 3285.981378][T24698] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3285.987052][T24698] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3285.993298][T24698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3285.999548][T24698] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3286.005176][T24698] __do_sys_bpf+0x478/0x37b0 [ 3286.009765][T24698] ? bpf_prog_load+0x18a0/0x18a0 [ 3286.014926][T24698] ? __kasan_check_write+0x14/0x20 [ 3286.020387][T24698] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3286.025940][T24698] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3286.031375][T24698] ? wait_for_completion+0x440/0x440 [ 3286.037152][T24698] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3286.043410][T24698] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3286.049057][T24698] ? do_syscall_64+0x26/0x790 [ 3286.053927][T24698] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3286.060190][T24698] ? do_syscall_64+0x26/0x790 [ 3286.064914][T24698] __x64_sys_bpf+0x73/0xb0 [ 3286.069331][T24698] do_syscall_64+0xfa/0x790 [ 3286.073889][T24698] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3286.079774][T24698] RIP: 0033:0x45a679 [ 3286.083662][T24698] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3286.103390][T24698] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 10:39:24 executing program 2 (fault-call:0 fault-nth:15): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3286.112047][T24698] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3286.120423][T24698] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3286.128573][T24698] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3286.136698][T24698] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3286.144756][T24698] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3286.201648][T24703] FAULT_INJECTION: forcing a failure. [ 3286.201648][T24703] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3286.218697][T24690] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3286.236280][T24690] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3286.236784][T24703] CPU: 1 PID: 24703 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3286.253867][T24703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3286.264432][T24703] Call Trace: [ 3286.267761][T24703] dump_stack+0x197/0x210 [ 3286.272198][T24703] should_fail.cold+0xa/0x15 [ 3286.276947][T24703] ? fault_create_debugfs_attr+0x180/0x180 [ 3286.283123][T24703] ? ___might_sleep+0x163/0x2c0 [ 3286.288093][T24703] should_fail_alloc_page+0x50/0x60 [ 3286.293310][T24703] __alloc_pages_nodemask+0x1a1/0x910 [ 3286.299152][T24703] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3286.304915][T24703] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3286.311171][T24703] ? find_next_bit+0x107/0x130 [ 3286.315950][T24703] pcpu_populate_chunk+0xf8/0x940 [ 3286.320971][T24703] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3286.326685][T24703] ? find_next_bit+0xc7/0x130 [ 3286.331555][T24703] pcpu_alloc+0xd5b/0x1380 [ 3286.336006][T24703] ? pcpu_alloc_area+0x820/0x820 [ 3286.341442][T24703] __alloc_percpu_gfp+0x28/0x30 [ 3286.346390][T24703] array_map_alloc+0x698/0x7d0 [ 3286.351664][T24703] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3286.357566][T24703] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3286.364030][T24703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3286.370851][T24703] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3286.376588][T24703] __do_sys_bpf+0x478/0x37b0 [ 3286.381192][T24703] ? bpf_prog_load+0x18a0/0x18a0 [ 3286.386153][T24703] ? __kasan_check_write+0x14/0x20 [ 3286.391364][T24703] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3286.396981][T24703] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3286.402389][T24703] ? wait_for_completion+0x440/0x440 [ 3286.407710][T24703] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3286.414052][T24703] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3286.419683][T24703] ? do_syscall_64+0x26/0x790 [ 3286.424533][T24703] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3286.430620][T24703] ? do_syscall_64+0x26/0x790 [ 3286.435308][T24703] __x64_sys_bpf+0x73/0xb0 [ 3286.439733][T24703] do_syscall_64+0xfa/0x790 [ 3286.444248][T24703] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3286.450361][T24703] RIP: 0033:0x45a679 [ 3286.454394][T24703] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3286.474299][T24703] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3286.482865][T24703] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3286.490851][T24703] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 10:39:24 executing program 2 (fault-call:0 fault-nth:16): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3286.498956][T24703] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3286.506922][T24703] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3286.515102][T24703] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 10:39:24 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(0xffffffffffffffff) 10:39:24 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup./et//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) [ 3286.608191][T24706] FAULT_INJECTION: forcing a failure. [ 3286.608191][T24706] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3286.624061][T24706] CPU: 1 PID: 24706 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3286.632428][T24706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3286.642853][T24706] Call Trace: [ 3286.642877][T24706] dump_stack+0x197/0x210 [ 3286.642900][T24706] should_fail.cold+0xa/0x15 [ 3286.642918][T24706] ? fault_create_debugfs_attr+0x180/0x180 [ 3286.642938][T24706] ? ___might_sleep+0x163/0x2c0 [ 3286.666769][T24706] should_fail_alloc_page+0x50/0x60 [ 3286.671987][T24706] __alloc_pages_nodemask+0x1a1/0x910 [ 3286.677380][T24706] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3286.677403][T24706] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3286.677415][T24706] ? find_next_bit+0x107/0x130 [ 3286.677436][T24706] pcpu_populate_chunk+0xf8/0x940 [ 3286.677453][T24706] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3286.677465][T24706] ? find_next_bit+0xc7/0x130 [ 3286.677485][T24706] pcpu_alloc+0xd5b/0x1380 [ 3286.677509][T24706] ? pcpu_alloc_area+0x820/0x820 [ 3286.677532][T24706] __alloc_percpu_gfp+0x28/0x30 [ 3286.677558][T24706] array_map_alloc+0x698/0x7d0 [ 3286.699826][T24706] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3286.699999][T24706] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3286.700022][T24706] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3286.700037][T24706] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3286.700051][T24706] __do_sys_bpf+0x478/0x37b0 [ 3286.700067][T24706] ? bpf_prog_load+0x18a0/0x18a0 [ 3286.700080][T24706] ? __kasan_check_write+0x14/0x20 [ 3286.700094][T24706] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3286.700107][T24706] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3286.700120][T24706] ? wait_for_completion+0x440/0x440 [ 3286.700138][T24706] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3286.700161][T24706] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3286.700174][T24706] ? do_syscall_64+0x26/0x790 [ 3286.700188][T24706] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3286.700201][T24706] ? do_syscall_64+0x26/0x790 [ 3286.700220][T24706] __x64_sys_bpf+0x73/0xb0 [ 3286.700235][T24706] do_syscall_64+0xfa/0x790 [ 3286.700251][T24706] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3286.700262][T24706] RIP: 0033:0x45a679 [ 3286.700275][T24706] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:39:25 executing program 2 (fault-call:0 fault-nth:17): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3286.700282][T24706] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3286.700294][T24706] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3286.700302][T24706] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3286.700309][T24706] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3286.700316][T24706] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3286.700323][T24706] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3286.770156][T24710] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3286.882722][T24710] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3286.915776][T24719] FAULT_INJECTION: forcing a failure. [ 3286.915776][T24719] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3286.936795][T24719] CPU: 0 PID: 24719 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3286.945146][T24719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3286.955335][T24719] Call Trace: [ 3286.958636][T24719] dump_stack+0x197/0x210 [ 3286.958666][T24719] should_fail.cold+0xa/0x15 [ 3286.967930][T24719] ? fault_create_debugfs_attr+0x180/0x180 [ 3286.967945][T24719] ? ___might_sleep+0x163/0x2c0 [ 3286.967970][T24719] should_fail_alloc_page+0x50/0x60 [ 3286.967984][T24719] __alloc_pages_nodemask+0x1a1/0x910 [ 3286.968004][T24719] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3286.984562][T24719] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3286.984582][T24719] ? find_next_bit+0x107/0x130 [ 3286.996074][T24719] pcpu_populate_chunk+0xf8/0x940 [ 3286.996088][T24719] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3286.996105][T24719] ? find_next_bit+0xc7/0x130 [ 3287.007093][T24719] pcpu_alloc+0xd5b/0x1380 [ 3287.007117][T24719] ? pcpu_alloc_area+0x820/0x820 [ 3287.018167][T24719] __alloc_percpu_gfp+0x28/0x30 [ 3287.018185][T24719] array_map_alloc+0x698/0x7d0 [ 3287.018204][T24719] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3287.018223][T24719] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3287.027285][T24719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3287.027303][T24719] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3287.027320][T24719] __do_sys_bpf+0x478/0x37b0 [ 3287.027343][T24719] ? bpf_prog_load+0x18a0/0x18a0 [ 3287.037103][T24719] ? __kasan_check_write+0x14/0x20 [ 3287.037118][T24719] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3287.037136][T24719] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3287.047521][T24719] ? wait_for_completion+0x440/0x440 [ 3287.047544][T24719] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3287.047580][T24719] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3287.060215][T24719] ? do_syscall_64+0x26/0x790 [ 3287.060233][T24719] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3287.060247][T24719] ? do_syscall_64+0x26/0x790 [ 3287.060265][T24719] __x64_sys_bpf+0x73/0xb0 [ 3287.060283][T24719] do_syscall_64+0xfa/0x790 [ 3287.070489][T24719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3287.070501][T24719] RIP: 0033:0x45a679 [ 3287.070517][T24719] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3287.070525][T24719] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3287.070544][T24719] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3287.181047][T24719] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3287.189017][T24719] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3287.197048][T24719] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3287.205242][T24719] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 10:39:40 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700", 0x2c}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:39:40 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) 10:39:40 executing program 2 (fault-call:0 fault-nth:18): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:39:40 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\xbbp\x01\x00', 0x4009}) 10:39:40 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//.z0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7947c101e4600800000efff065900001943449fc1dcf86e0008d70000000000c6b5af027400005822e8f98b2b4077445b2fef3efddc547d08d3f4215a73e8d9ffcd60ac4807eafef8078a0f219e25e2a0e0a729aa6d43bc1107b9cf2a89a797cd5c578f0000000000000000000000000000000000000056a62e5a1aa8fb8856e1e0333a81dc43d3baea26962ade38deb5629dd4dabb0f32ba9b6ca4d5c2247c1621b8a5f49fbf922256de3b9579ae270980003cabc10d38e4ffd7bd80080f53ca9e4127035460328f4b77e121254b0313a191ec0dc15a949dd272f38d32e06f864aa93a0cf2df860a36f952717c788e5617a566440e22cddb2310acdf7d25b3f00d49b8b87ceb3d9eb49e58aa8fb3638d4036905bbf66c3b0de83568bdd2e8afdf6f80600000000000000000000000000000000000000b2d980d9714429b928c4b9eeff737a645fea18800d9e1d97e28c593694a0bec53608bcbed51d99987ead09b639bb9f7c6300ae0d556d16334413a8a80e440a3c5e89734ba69bdb6b63c89e777bebae18c0b6ee92260506989430696df40dc6a1c168b3b91f464e67bc8bc44cf66f8e8c37c94cbab1abc01afbdb700299ea8908f94f0fceb5c5484d180f76024813eb213fc8f01ef9b57d2158c6831aa373783995b0e84fdfdfb7a5048679bd2c32bba5763fcc15143d3d18166f752390bbb3c3fc0ee660b9a412be819af0"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:39:40 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(0xffffffffffffffff) [ 3302.289203][T24745] FAULT_INJECTION: forcing a failure. [ 3302.289203][T24745] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3302.302693][T24745] CPU: 0 PID: 24745 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3302.311016][T24745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3302.311023][T24745] Call Trace: [ 3302.311045][T24745] dump_stack+0x197/0x210 [ 3302.311070][T24745] should_fail.cold+0xa/0x15 [ 3302.311091][T24745] ? fault_create_debugfs_attr+0x180/0x180 [ 3302.311108][T24745] ? ___might_sleep+0x163/0x2c0 [ 3302.311131][T24745] should_fail_alloc_page+0x50/0x60 [ 3302.311145][T24745] __alloc_pages_nodemask+0x1a1/0x910 [ 3302.311167][T24745] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3302.311189][T24745] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3302.311203][T24745] ? find_next_bit+0x107/0x130 [ 3302.311223][T24745] pcpu_populate_chunk+0xf8/0x940 [ 3302.311237][T24745] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3302.311249][T24745] ? find_next_bit+0xc7/0x130 [ 3302.311268][T24745] pcpu_alloc+0xd5b/0x1380 [ 3302.311289][T24745] ? pcpu_alloc_area+0x820/0x820 [ 3302.329040][T24745] __alloc_percpu_gfp+0x28/0x30 [ 3302.329057][T24745] array_map_alloc+0x698/0x7d0 [ 3302.329077][T24745] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3302.329098][T24745] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3302.339471][T24745] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3302.339490][T24745] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3302.339506][T24745] __do_sys_bpf+0x478/0x37b0 [ 3302.339526][T24745] ? bpf_prog_load+0x18a0/0x18a0 10:39:40 executing program 2 (fault-call:0 fault-nth:19): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3302.339539][T24745] ? __kasan_check_write+0x14/0x20 [ 3302.339557][T24745] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3302.349602][T24745] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3302.366905][T24745] ? wait_for_completion+0x440/0x440 [ 3302.366927][T24745] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3302.366954][T24745] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3302.381617][T24747] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3302.382426][T24745] ? do_syscall_64+0x26/0x790 [ 3302.382445][T24745] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3302.382464][T24745] ? do_syscall_64+0x26/0x790 [ 3302.387262][T24747] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3302.391637][T24745] __x64_sys_bpf+0x73/0xb0 [ 3302.391657][T24745] do_syscall_64+0xfa/0x790 [ 3302.391683][T24745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3302.401435][T24745] RIP: 0033:0x45a679 [ 3302.401451][T24745] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3302.401458][T24745] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3302.401472][T24745] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3302.401481][T24745] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3302.401489][T24745] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3302.401498][T24745] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3302.401506][T24745] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3302.519696][T24753] FAULT_INJECTION: forcing a failure. [ 3302.519696][T24753] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3302.524283][T24753] CPU: 0 PID: 24753 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3302.552267][T24753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3302.552273][T24753] Call Trace: [ 3302.552292][T24753] dump_stack+0x197/0x210 [ 3302.552315][T24753] should_fail.cold+0xa/0x15 [ 3302.552332][T24753] ? fault_create_debugfs_attr+0x180/0x180 [ 3302.552351][T24753] ? ___might_sleep+0x163/0x2c0 [ 3302.568316][T24753] should_fail_alloc_page+0x50/0x60 [ 3302.568333][T24753] __alloc_pages_nodemask+0x1a1/0x910 [ 3302.568350][T24753] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3302.568372][T24753] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3302.586110][T24753] ? find_next_bit+0x107/0x130 [ 3302.586129][T24753] pcpu_populate_chunk+0xf8/0x940 [ 3302.586147][T24753] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3302.607266][T24753] ? find_next_bit+0xc7/0x130 [ 3302.607288][T24753] pcpu_alloc+0xd5b/0x1380 [ 3302.607311][T24753] ? pcpu_alloc_area+0x820/0x820 [ 3302.607346][T24753] __alloc_percpu_gfp+0x28/0x30 [ 3302.625695][T24753] array_map_alloc+0x698/0x7d0 [ 3302.625716][T24753] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3302.625734][T24753] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3302.625752][T24753] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3302.633353][T24753] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3302.633368][T24753] __do_sys_bpf+0x478/0x37b0 [ 3302.633387][T24753] ? bpf_prog_load+0x18a0/0x18a0 [ 3302.643734][T24753] ? __kasan_check_write+0x14/0x20 [ 3302.643749][T24753] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3302.643771][T24753] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3302.653773][T24753] ? wait_for_completion+0x440/0x440 [ 3302.653796][T24753] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3302.664847][T24753] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3302.664865][T24753] ? do_syscall_64+0x26/0x790 [ 3302.675825][T24753] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3302.675839][T24753] ? do_syscall_64+0x26/0x790 [ 3302.675860][T24753] __x64_sys_bpf+0x73/0xb0 [ 3302.686568][T24753] do_syscall_64+0xfa/0x790 [ 3302.686595][T24753] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3302.806569][T24753] RIP: 0033:0x45a679 [ 3302.810448][T24753] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3302.830042][T24753] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 10:39:41 executing program 2 (fault-call:0 fault-nth:20): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3302.838445][T24753] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3302.846402][T24753] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3302.854372][T24753] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3302.862325][T24753] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3302.870279][T24753] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3302.931467][T24759] FAULT_INJECTION: forcing a failure. [ 3302.931467][T24759] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3302.960850][T24759] CPU: 1 PID: 24759 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3302.969219][T24759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3302.979267][T24759] Call Trace: [ 3302.982566][T24759] dump_stack+0x197/0x210 [ 3302.986916][T24759] should_fail.cold+0xa/0x15 [ 3302.987133][T24743] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3302.991514][T24759] ? fault_create_debugfs_attr+0x180/0x180 [ 3302.991532][T24759] ? ___might_sleep+0x163/0x2c0 [ 3302.991558][T24759] should_fail_alloc_page+0x50/0x60 [ 3302.991575][T24759] __alloc_pages_nodemask+0x1a1/0x910 [ 3302.991597][T24759] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3302.991620][T24759] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3302.991632][T24759] ? find_next_bit+0x107/0x130 [ 3302.991651][T24759] pcpu_populate_chunk+0xf8/0x940 [ 3302.991666][T24759] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3302.991680][T24759] ? find_next_bit+0xc7/0x130 [ 3302.991702][T24759] pcpu_alloc+0xd5b/0x1380 [ 3302.991729][T24759] ? pcpu_alloc_area+0x820/0x820 [ 3302.991759][T24759] __alloc_percpu_gfp+0x28/0x30 [ 3303.006843][T24743] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3303.010453][T24759] array_map_alloc+0x698/0x7d0 [ 3303.010476][T24759] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3303.010495][T24759] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3303.010508][T24759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3303.010521][T24759] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3303.010536][T24759] __do_sys_bpf+0x478/0x37b0 [ 3303.010555][T24759] ? bpf_prog_load+0x18a0/0x18a0 [ 3303.010571][T24759] ? __kasan_check_write+0x14/0x20 [ 3303.010588][T24759] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3303.010603][T24759] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3303.010620][T24759] ? wait_for_completion+0x440/0x440 [ 3303.010642][T24759] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3303.010669][T24759] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3303.010687][T24759] ? do_syscall_64+0x26/0x790 [ 3303.150631][T24759] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3303.156683][T24759] ? do_syscall_64+0x26/0x790 [ 3303.161361][T24759] __x64_sys_bpf+0x73/0xb0 [ 3303.165762][T24759] do_syscall_64+0xfa/0x790 [ 3303.170338][T24759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3303.176212][T24759] RIP: 0033:0x45a679 [ 3303.180154][T24759] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3303.200001][T24759] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3303.208395][T24759] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3303.216364][T24759] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3303.224317][T24759] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 10:39:41 executing program 2 (fault-call:0 fault-nth:21): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3303.232355][T24759] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3303.240311][T24759] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 10:39:41 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net///z0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7947c101e4600800000efff065900001943449fc1dcf86e0008d70000000000c6b5af027400005822e8f98b2b4077445b2fef3efddc547d08d3f4215a73e8d9ffcd60ac4807eafef8078a0f219e25e2a0e0a729aa6d43bc1107b9cf2a89a797cd5c578f0000000000000000000000000000000000000056a62e5a1aa8fb8856e1e0333a81dc43d3baea26962ade38deb5629dd4dabb0f32ba9b6ca4d5c2247c1621b8a5f49fbf922256de3b9579ae270980003cabc10d38e4ffd7bd80080f53ca9e4127035460328f4b77e121254b0313a191ec0dc15a949dd272f38d32e06f864aa93a0cf2df860a36f952717c788e5617a566440e22cddb2310acdf7d25b3f00d49b8b87ceb3d9eb49e58aa8fb3638d4036905bbf66c3b0de83568bdd2e8afdf6f80600000000000000000000000000000000000000b2d980d9714429b928c4b9eeff737a645fea18800d9e1d97e28c593694a0bec53608bcbed51d99987ead09b639bb9f7c6300ae0d556d16334413a8a80e440a3c5e89734ba69bdb6b63c89e777bebae18c0b6ee92260506989430696df40dc6a1c168b3b91f464e67bc8bc44cf66f8e8c37c94cbab1abc01afbdb700299ea8908f94f0fceb5c5484d180f76024813eb213fc8f01ef9b57d2158c6831aa373783995b0e84fdfdfb7a5048679bd2c32bba5763fcc15143d3d18166f752390bbb3c3fc0ee660b9a412be819af0"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) [ 3303.306953][T24763] FAULT_INJECTION: forcing a failure. [ 3303.306953][T24763] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3303.351437][T24763] CPU: 1 PID: 24763 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3303.359814][T24763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3303.370396][T24763] Call Trace: [ 3303.373725][T24763] dump_stack+0x197/0x210 [ 3303.378080][T24763] should_fail.cold+0xa/0x15 [ 3303.382685][T24763] ? fault_create_debugfs_attr+0x180/0x180 [ 3303.388524][T24763] ? ___might_sleep+0x163/0x2c0 [ 3303.393405][T24763] should_fail_alloc_page+0x50/0x60 [ 3303.398614][T24763] __alloc_pages_nodemask+0x1a1/0x910 [ 3303.404000][T24763] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3303.409740][T24763] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3303.415974][T24763] ? find_next_bit+0x107/0x130 [ 3303.420751][T24763] pcpu_populate_chunk+0xf8/0x940 [ 3303.425782][T24763] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3303.431516][T24763] ? find_next_bit+0xc7/0x130 [ 3303.436207][T24763] pcpu_alloc+0xd5b/0x1380 [ 3303.440639][T24763] ? pcpu_alloc_area+0x820/0x820 [ 3303.445718][T24763] __alloc_percpu_gfp+0x28/0x30 [ 3303.450594][T24763] array_map_alloc+0x698/0x7d0 [ 3303.451707][T24768] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3303.455371][T24763] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3303.455396][T24763] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3303.470259][T24768] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3303.475303][T24763] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3303.475323][T24763] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3303.475340][T24763] __do_sys_bpf+0x478/0x37b0 [ 3303.475365][T24763] ? bpf_prog_load+0x18a0/0x18a0 [ 3303.475381][T24763] ? __kasan_check_write+0x14/0x20 [ 3303.475395][T24763] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3303.475415][T24763] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3303.520919][T24763] ? wait_for_completion+0x440/0x440 [ 3303.526227][T24763] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3303.532463][T24763] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3303.537919][T24763] ? do_syscall_64+0x26/0x790 [ 3303.542632][T24763] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3303.548709][T24763] ? do_syscall_64+0x26/0x790 [ 3303.553387][T24763] __x64_sys_bpf+0x73/0xb0 [ 3303.557804][T24763] do_syscall_64+0xfa/0x790 [ 3303.562380][T24763] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3303.568285][T24763] RIP: 0033:0x45a679 [ 3303.572172][T24763] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3303.591879][T24763] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 10:39:41 executing program 2 (fault-call:0 fault-nth:22): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:39:41 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(0xffffffffffffffff) [ 3303.600298][T24763] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3303.608282][T24763] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3303.616343][T24763] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3303.624308][T24763] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3303.632285][T24763] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3303.760701][T24780] FAULT_INJECTION: forcing a failure. [ 3303.760701][T24780] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3303.777873][T24780] CPU: 0 PID: 24780 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3303.786229][T24780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3303.796500][T24780] Call Trace: [ 3303.799829][T24780] dump_stack+0x197/0x210 [ 3303.804150][T24780] should_fail.cold+0xa/0x15 [ 3303.808732][T24780] ? fault_create_debugfs_attr+0x180/0x180 [ 3303.814523][T24780] ? ___might_sleep+0x163/0x2c0 [ 3303.819361][T24780] should_fail_alloc_page+0x50/0x60 [ 3303.824540][T24780] __alloc_pages_nodemask+0x1a1/0x910 [ 3303.829895][T24780] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3303.835614][T24780] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3303.841833][T24780] ? find_next_bit+0x107/0x130 [ 3303.846632][T24780] pcpu_populate_chunk+0xf8/0x940 [ 3303.851845][T24780] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3303.857553][T24780] ? find_next_bit+0xc7/0x130 [ 3303.862217][T24780] pcpu_alloc+0xd5b/0x1380 [ 3303.866630][T24780] ? pcpu_alloc_area+0x820/0x820 [ 3303.873833][T24780] __alloc_percpu_gfp+0x28/0x30 [ 3303.878740][T24780] array_map_alloc+0x698/0x7d0 [ 3303.883494][T24780] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3303.889159][T24780] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3303.895381][T24780] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3303.901603][T24780] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3303.907225][T24780] __do_sys_bpf+0x478/0x37b0 [ 3303.911802][T24780] ? bpf_prog_load+0x18a0/0x18a0 [ 3303.916719][T24780] ? __kasan_check_write+0x14/0x20 [ 3303.921812][T24780] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3303.927351][T24780] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3303.932633][T24780] ? wait_for_completion+0x440/0x440 [ 3303.937906][T24780] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3303.944132][T24780] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3303.949575][T24780] ? do_syscall_64+0x26/0x790 [ 3303.954243][T24780] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3303.960299][T24780] ? do_syscall_64+0x26/0x790 [ 3303.964961][T24780] __x64_sys_bpf+0x73/0xb0 [ 3303.969361][T24780] do_syscall_64+0xfa/0x790 [ 3303.973865][T24780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3303.979743][T24780] RIP: 0033:0x45a679 [ 3303.983635][T24780] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3304.003230][T24780] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3304.011623][T24780] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3304.019572][T24780] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3304.027543][T24780] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3304.035494][T24780] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3304.043445][T24780] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 10:39:51 executing program 2 (fault-call:0 fault-nth:23): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:39:51 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700", 0x2c}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:39:51 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00pidids\"\x00\x00\x00\x00\x00\x00\x00\x00'], 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:39:51 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\xbcp\x01\x00', 0x4009}) 10:39:51 executing program 3: 10:39:51 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000040)) 10:39:51 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x2}, [@call={0x161, 0x11, 0xd8}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 3313.592775][T24798] FAULT_INJECTION: forcing a failure. [ 3313.592775][T24798] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3313.612601][T24798] CPU: 0 PID: 24798 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3313.620975][T24798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3313.631142][T24798] Call Trace: [ 3313.631168][T24798] dump_stack+0x197/0x210 [ 3313.631194][T24798] should_fail.cold+0xa/0x15 [ 3313.631222][T24798] ? fault_create_debugfs_attr+0x180/0x180 [ 3313.649212][T24798] ? ___might_sleep+0x163/0x2c0 [ 3313.654081][T24798] should_fail_alloc_page+0x50/0x60 [ 3313.659291][T24798] __alloc_pages_nodemask+0x1a1/0x910 [ 3313.664676][T24798] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3313.670411][T24798] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3313.676656][T24798] ? find_next_bit+0x107/0x130 [ 3313.681438][T24798] pcpu_populate_chunk+0xf8/0x940 [ 3313.686494][T24798] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3313.692221][T24798] ? find_next_bit+0xc7/0x130 [ 3313.696917][T24798] pcpu_alloc+0xd5b/0x1380 [ 3313.697520][T24805] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3313.702212][T24798] ? pcpu_alloc_area+0x820/0x820 [ 3313.702238][T24798] __alloc_percpu_gfp+0x28/0x30 [ 3313.717613][T24805] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3313.720174][T24798] array_map_alloc+0x698/0x7d0 [ 3313.720198][T24798] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3313.720219][T24798] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3313.720233][T24798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3313.720253][T24798] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3313.756881][T24798] __do_sys_bpf+0x478/0x37b0 [ 3313.761460][T24798] ? bpf_prog_load+0x18a0/0x18a0 [ 3313.766389][T24798] ? __kasan_check_write+0x14/0x20 [ 3313.771484][T24798] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3313.777012][T24798] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3313.782281][T24798] ? wait_for_completion+0x440/0x440 [ 3313.787550][T24798] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3313.793953][T24798] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3313.799391][T24798] ? do_syscall_64+0x26/0x790 [ 3313.804165][T24798] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3313.810273][T24798] ? do_syscall_64+0x26/0x790 [ 3313.814954][T24798] __x64_sys_bpf+0x73/0xb0 [ 3313.819376][T24798] do_syscall_64+0xfa/0x790 [ 3313.823904][T24798] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3313.829787][T24798] RIP: 0033:0x45a679 [ 3313.833697][T24798] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3313.853282][T24798] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3313.861679][T24798] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3313.869645][T24798] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3313.877607][T24798] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3313.885570][T24798] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 10:39:52 executing program 2 (fault-call:0 fault-nth:24): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:39:52 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa10000000000000c010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 3313.893636][T24798] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3313.988476][T24812] FAULT_INJECTION: forcing a failure. [ 3313.988476][T24812] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3314.001796][T24812] CPU: 1 PID: 24812 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3314.010126][T24812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3314.020270][T24812] Call Trace: [ 3314.023673][T24812] dump_stack+0x197/0x210 [ 3314.028026][T24812] should_fail.cold+0xa/0x15 [ 3314.032733][T24812] ? fault_create_debugfs_attr+0x180/0x180 [ 3314.038552][T24812] ? ___might_sleep+0x163/0x2c0 [ 3314.043426][T24812] should_fail_alloc_page+0x50/0x60 [ 3314.048637][T24812] __alloc_pages_nodemask+0x1a1/0x910 [ 3314.053125][T24795] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3314.054020][T24812] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3314.054045][T24812] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3314.054059][T24812] ? find_next_bit+0x107/0x130 [ 3314.054080][T24812] pcpu_populate_chunk+0xf8/0x940 [ 3314.071942][T24795] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3314.074926][T24812] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3314.074942][T24812] ? find_next_bit+0xc7/0x130 [ 3314.074966][T24812] pcpu_alloc+0xd5b/0x1380 [ 3314.074991][T24812] ? pcpu_alloc_area+0x820/0x820 [ 3314.075021][T24812] __alloc_percpu_gfp+0x28/0x30 [ 3314.117643][T24812] array_map_alloc+0x698/0x7d0 [ 3314.122421][T24812] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3314.128061][T24812] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3314.134365][T24812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3314.140608][T24812] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3314.146367][T24812] __do_sys_bpf+0x478/0x37b0 [ 3314.150977][T24812] ? bpf_prog_load+0x18a0/0x18a0 [ 3314.155920][T24812] ? __kasan_check_write+0x14/0x20 [ 3314.161039][T24812] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3314.166601][T24812] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3314.171891][T24812] ? wait_for_completion+0x440/0x440 [ 3314.177211][T24812] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3314.183474][T24812] ? trace_hardirqs_on_thunk+0x1a/0x1c 10:39:52 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) [ 3314.188937][T24812] ? do_syscall_64+0x26/0x790 [ 3314.193616][T24812] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3314.199678][T24812] ? do_syscall_64+0x26/0x790 [ 3314.199699][T24812] __x64_sys_bpf+0x73/0xb0 [ 3314.199715][T24812] do_syscall_64+0xfa/0x790 [ 3314.199735][T24812] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3314.199746][T24812] RIP: 0033:0x45a679 [ 3314.199761][T24812] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3314.199769][T24812] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3314.199783][T24812] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3314.199791][T24812] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3314.199799][T24812] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3314.199812][T24812] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 10:39:52 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x200000000004, 0x4, 0x3}, 0x3c) close(r0) 10:39:52 executing program 2 (fault-call:0 fault-nth:25): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3314.208867][T24812] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3314.333545][T24821] FAULT_INJECTION: forcing a failure. [ 3314.333545][T24821] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3314.346607][T24825] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3314.388007][T24825] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3314.404431][T24821] CPU: 1 PID: 24821 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3314.412794][T24821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3314.422848][T24821] Call Trace: [ 3314.426143][T24821] dump_stack+0x197/0x210 [ 3314.430480][T24821] should_fail.cold+0xa/0x15 [ 3314.435067][T24821] ? fault_create_debugfs_attr+0x180/0x180 [ 3314.440883][T24821] ? ___might_sleep+0x163/0x2c0 [ 3314.445750][T24821] should_fail_alloc_page+0x50/0x60 [ 3314.450953][T24821] __alloc_pages_nodemask+0x1a1/0x910 [ 3314.456326][T24821] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3314.462038][T24821] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3314.468271][T24821] ? find_next_bit+0x107/0x130 [ 3314.473046][T24821] pcpu_populate_chunk+0xf8/0x940 [ 3314.478071][T24821] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3314.483794][T24821] ? find_next_bit+0xc7/0x130 10:39:52 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x98}]}, &(0x7f0000000100)='GPL\x00'}, 0x3b) [ 3314.488485][T24821] pcpu_alloc+0xd5b/0x1380 [ 3314.492923][T24821] ? pcpu_alloc_area+0x820/0x820 [ 3314.497876][T24821] __alloc_percpu_gfp+0x28/0x30 [ 3314.502738][T24821] array_map_alloc+0x698/0x7d0 [ 3314.507517][T24821] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3314.513160][T24821] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3314.519417][T24821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3314.525673][T24821] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3314.531311][T24821] __do_sys_bpf+0x478/0x37b0 [ 3314.535888][T24821] ? bpf_prog_load+0x18a0/0x18a0 [ 3314.540907][T24821] ? __kasan_check_write+0x14/0x20 [ 3314.546082][T24821] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3314.551722][T24821] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3314.557002][T24821] ? wait_for_completion+0x440/0x440 [ 3314.562288][T24821] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3314.568518][T24821] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3314.573957][T24821] ? do_syscall_64+0x26/0x790 [ 3314.578615][T24821] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3314.584662][T24821] ? do_syscall_64+0x26/0x790 [ 3314.589330][T24821] __x64_sys_bpf+0x73/0xb0 [ 3314.593740][T24821] do_syscall_64+0xfa/0x790 [ 3314.598249][T24821] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3314.604120][T24821] RIP: 0033:0x45a679 [ 3314.607994][T24821] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3314.627590][T24821] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3314.635985][T24821] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3314.643939][T24821] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3314.651892][T24821] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3314.659842][T24821] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3314.667790][T24821] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3314.791754][T24817] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3314.814136][T24817] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 10:40:03 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1", 0x2d}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:40:03 executing program 2 (fault-call:0 fault-nth:26): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:40:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0x12, 0x9, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x1}, 0x3c) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 10:40:03 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\xbdp\x01\x00', 0x4009}) 10:40:03 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x10790, 0x0, 0xad9, 0x9, 0x462f, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r11 = openat$cgroup_ro(r10, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) sendmsg$kcm(r11, &(0x7f00000002c0)={&(0x7f0000000680)=@in6={0xa, 0x4e23, 0x4, @loopback, 0x2}, 0x80, &(0x7f0000001c80)=[{&(0x7f0000000780)="7fd6d6417f6150c2a1dfcc67d28fd7c9fb390cbc9c24140207eb3d93523b348c4619f5e9791ae1f1d3a5d8b4eda942ee53b303252babdfa1c879525aa2cb8125168556e5a8ce433cd89669bf9f25ceb4cbdef27a933c921cc9a0d0db629eccb43718b85169aa83cef4ed44c143c432ca6f7f195d280d1d9298351aa14a15a0555d27ef20e395bd1683a213c5bc00503b51338849bcb5f1bb785350f0dba1db8a20fe2fecdf5e7c8820a009db828c0c7cd7f519dff1527b2bda651e35b683917687da7f70acad85f9426c4ee147f81e", 0xcf}, {&(0x7f0000000440)="e4cbdc4b2d0613b1b7053a4958176d343d8055cffaae650a673405aac83288af332511373996ecd1e9e5119a4144c455f7756003bde97294a85f4482f27f0b2a65425e8cd7c309fd3f173ffc3fe98b380d9d8e845ff4ca2a", 0x58}, {&(0x7f0000000880)="5ac7056a2d4378d6938aee6593cb3ed2a109b6dcad497162ec12bbbccfc4a367331ee4a7c4092aeb9c52dddd66b1aebe4957691a2ec8567de13a613190d095e66f795e1059fea361487be90bcace0455a5fd9325da26b3dcc343dcb09af202ef8ba098c9f4e09d", 0x67}, {&(0x7f0000000900)="a47722998a4c81a2eb4068042d8c9887dadd270ca4acec07da59a4b1e9efeb098be04067d0d797abeb868741aec90b33516d4358277992443692ddd42dc1ce573bec1177da431658813323836812a19f9e182ab17453b4d3e5e3e23c032830e78dc15e1c17074147ac4d77c83fec77ea0716c47ac8592bec7f5ce48f2311722df705e9f52994abed66dba141316d11a4767f99251a183075c9468b056a522b049185e590e27d934ef599a66e82a7a34bcf6e3d7c1d1254c890712428e864cc5dc15e7c7aa593e6039eba7d06888c3c5ff3bdaace843e961352a226eb647a92", 0xdf}, {0x0}, {&(0x7f0000000700)="605888c8268e3ef7f8a6da1b496e29ebab1b095f46846808f980fcc9ffc0b89696a1373c2da2eaa8c0d6334ef33101e5b24abad2ab46b0d55bfef0", 0x3b}, {&(0x7f0000000a00)="bc4031660dcbfea099744f60c1ba5aee4c7a56036f4278f02b2147e3c70885e72fba0f6f9ab5766f15113bc069cd110c457f6cdeb5c5e0f918a6c3c92328866c62114f6eab9457cb5470ee6e3fbe1516b4b451", 0x53}, {&(0x7f0000000a80)="29efd74253cee67f0a8967d849bc67a87fbf530cd5fe5a3c7ce3af774292c868d678dab84eb1d9547da6145d445489926fc70c07d46a7a1b4a12119c80", 0x3d}], 0x8}, 0x40004) ioctl$TUNGETVNETHDRSZ(r11, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r11, 0x0, 0xf800000000000000) r12 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x10, r11, 0x1) r13 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0xccd, 0x0, 0x3, 0x0, 0x1f, 0x1000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xd}, 0x0, 0x40000000000000, 0x3, 0x3}, r13, 0xe, r12, 0xa6f54f15e4426112) r14 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r13, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r14, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r15, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r15, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r16 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r16, 0x401054d6, 0x0) 10:40:03 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='M|\x00\xdb\xd4CGU\f\xc4/\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000040)={'hsr0\x00', @remote}) [ 3324.870335][T24848] FAULT_INJECTION: forcing a failure. [ 3324.870335][T24848] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3324.883950][T24848] CPU: 1 PID: 24848 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3324.892290][T24848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3324.902361][T24848] Call Trace: [ 3324.905666][T24848] dump_stack+0x197/0x210 [ 3324.910037][T24848] should_fail.cold+0xa/0x15 [ 3324.914640][T24848] ? fault_create_debugfs_attr+0x180/0x180 [ 3324.920444][T24848] ? ___might_sleep+0x163/0x2c0 [ 3324.925293][T24848] should_fail_alloc_page+0x50/0x60 [ 3324.930488][T24848] __alloc_pages_nodemask+0x1a1/0x910 [ 3324.935941][T24848] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3324.941646][T24848] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3324.947882][T24848] ? find_next_bit+0x107/0x130 [ 3324.952650][T24848] pcpu_populate_chunk+0xf8/0x940 [ 3324.957655][T24848] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3324.963354][T24848] ? find_next_bit+0xc7/0x130 [ 3324.968016][T24848] pcpu_alloc+0xd5b/0x1380 [ 3324.972417][T24848] ? pcpu_alloc_area+0x820/0x820 [ 3324.977343][T24848] __alloc_percpu_gfp+0x28/0x30 [ 3324.982175][T24848] array_map_alloc+0x698/0x7d0 [ 3324.986924][T24848] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3324.992540][T24848] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3324.998762][T24848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3325.004984][T24848] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3325.010601][T24848] __do_sys_bpf+0x478/0x37b0 [ 3325.015175][T24848] ? bpf_prog_load+0x18a0/0x18a0 [ 3325.020096][T24848] ? __kasan_check_write+0x14/0x20 [ 3325.025188][T24848] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3325.030714][T24848] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3325.035978][T24848] ? wait_for_completion+0x440/0x440 [ 3325.041250][T24848] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3325.047482][T24848] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3325.052921][T24848] ? do_syscall_64+0x26/0x790 [ 3325.057582][T24848] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3325.063629][T24848] ? do_syscall_64+0x26/0x790 [ 3325.068289][T24848] __x64_sys_bpf+0x73/0xb0 [ 3325.072692][T24848] do_syscall_64+0xfa/0x790 [ 3325.077184][T24848] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3325.083059][T24848] RIP: 0033:0x45a679 [ 3325.086959][T24848] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3325.106559][T24848] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3325.114960][T24848] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3325.122917][T24848] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3325.130880][T24848] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3325.138832][T24848] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3325.146785][T24848] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 10:40:03 executing program 2 (fault-call:0 fault-nth:27): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3325.243407][T24859] FAULT_INJECTION: forcing a failure. [ 3325.243407][T24859] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3325.258918][T24860] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3325.267017][T24860] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3325.279146][T24859] CPU: 1 PID: 24859 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3325.287600][T24859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3325.297878][T24859] Call Trace: [ 3325.301207][T24859] dump_stack+0x197/0x210 [ 3325.306062][T24859] should_fail.cold+0xa/0x15 [ 3325.310647][T24859] ? fault_create_debugfs_attr+0x180/0x180 [ 3325.316650][T24859] ? ___might_sleep+0x163/0x2c0 [ 3325.321527][T24859] should_fail_alloc_page+0x50/0x60 [ 3325.326720][T24859] __alloc_pages_nodemask+0x1a1/0x910 [ 3325.332090][T24859] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3325.337904][T24859] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3325.344182][T24859] ? find_next_bit+0x107/0x130 [ 3325.349085][T24859] pcpu_populate_chunk+0xf8/0x940 [ 3325.354111][T24859] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3325.359826][T24859] ? find_next_bit+0xc7/0x130 [ 3325.364502][T24859] pcpu_alloc+0xd5b/0x1380 [ 3325.368924][T24859] ? pcpu_alloc_area+0x820/0x820 [ 3325.373864][T24859] __alloc_percpu_gfp+0x28/0x30 [ 3325.378714][T24859] array_map_alloc+0x698/0x7d0 [ 3325.383489][T24859] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3325.389120][T24859] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3325.395437][T24859] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3325.401660][T24859] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3325.407283][T24859] __do_sys_bpf+0x478/0x37b0 [ 3325.411873][T24859] ? bpf_prog_load+0x18a0/0x18a0 [ 3325.416832][T24859] ? __kasan_check_write+0x14/0x20 [ 3325.421928][T24859] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3325.427572][T24859] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3325.432849][T24859] ? wait_for_completion+0x440/0x440 [ 3325.438139][T24859] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3325.444402][T24859] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3325.449873][T24859] ? do_syscall_64+0x26/0x790 [ 3325.454558][T24859] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3325.460906][T24859] ? do_syscall_64+0x26/0x790 [ 3325.465586][T24859] __x64_sys_bpf+0x73/0xb0 [ 3325.470013][T24859] do_syscall_64+0xfa/0x790 [ 3325.474515][T24859] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3325.480386][T24859] RIP: 0033:0x45a679 [ 3325.484261][T24859] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3325.504024][T24859] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3325.512435][T24859] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3325.520528][T24859] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3325.528494][T24859] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3325.536459][T24859] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 10:40:03 executing program 3: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) [ 3325.544414][T24859] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 10:40:03 executing program 2 (fault-call:0 fault-nth:28): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:40:04 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x22, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000300), 0x3}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x80, 0x80}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000740)=ANY=[@ANYBLOB="0070696450202d696f202d70691cb3be1a992e5f049b49a731beb35e0831fd7ace4125fd67dba260e3491739642cbed0296673f2ca0cfe8f03cdf4b25776331fa152ece25787519263db0794a671c57e169146a6b9e8564033a85c7c2133a67adceda30fe4aa78d356c2432480d1925a9daf3c903b82a9fd4cda90da1ab1df862ff227cb2d32bb51ebffff882e674933865e2b193f6588c050b8e7fba21d1a26266512f3534063fd54e62808b9e0151268069a7415132a2496f09018a99275546b314bd83cad2ea08e2bf025fece85422499a5ff7242fa9b3ebb3723cae43a08133e4ef94db02570ba02d957a910a5d96decf024798f1f0fbbb7b4e682b0a77a9ab826ba2dd9"], 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) [ 3325.702347][T24871] FAULT_INJECTION: forcing a failure. [ 3325.702347][T24871] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3325.722088][T24871] CPU: 1 PID: 24871 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3325.730465][T24871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3325.740529][T24871] Call Trace: [ 3325.743836][T24871] dump_stack+0x197/0x210 [ 3325.748195][T24871] should_fail.cold+0xa/0x15 [ 3325.752805][T24871] ? fault_create_debugfs_attr+0x180/0x180 [ 3325.758625][T24871] ? ___might_sleep+0x163/0x2c0 [ 3325.763496][T24871] should_fail_alloc_page+0x50/0x60 [ 3325.768710][T24871] __alloc_pages_nodemask+0x1a1/0x910 [ 3325.774096][T24871] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3325.779833][T24871] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3325.786100][T24871] ? find_next_bit+0x107/0x130 [ 3325.790912][T24871] pcpu_populate_chunk+0xf8/0x940 [ 3325.795951][T24871] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3325.796758][T24874] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3325.801675][T24871] ? find_next_bit+0xc7/0x130 [ 3325.801699][T24871] pcpu_alloc+0xd5b/0x1380 [ 3325.801721][T24871] ? pcpu_alloc_area+0x820/0x820 [ 3325.801748][T24871] __alloc_percpu_gfp+0x28/0x30 [ 3325.801772][T24871] array_map_alloc+0x698/0x7d0 [ 3325.801792][T24871] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3325.801811][T24871] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3325.801821][T24871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3325.801841][T24871] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3325.816175][T24874] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3325.818967][T24871] __do_sys_bpf+0x478/0x37b0 [ 3325.818988][T24871] ? bpf_prog_load+0x18a0/0x18a0 [ 3325.819001][T24871] ? __kasan_check_write+0x14/0x20 [ 3325.819015][T24871] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3325.819030][T24871] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3325.819046][T24871] ? wait_for_completion+0x440/0x440 [ 3325.819066][T24871] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3325.819094][T24871] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3325.819109][T24871] ? do_syscall_64+0x26/0x790 [ 3325.819126][T24871] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3325.819140][T24871] ? do_syscall_64+0x26/0x790 [ 3325.819159][T24871] __x64_sys_bpf+0x73/0xb0 [ 3325.819177][T24871] do_syscall_64+0xfa/0x790 [ 3325.851802][T24871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3325.865464][T24871] RIP: 0033:0x45a679 10:40:04 executing program 2 (fault-call:0 fault-nth:29): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3325.865480][T24871] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3325.865488][T24871] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3325.865502][T24871] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3325.865517][T24871] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3325.919295][T24868] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 3325.923283][T24871] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3325.923292][T24871] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3325.923300][T24871] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3326.010704][T24880] FAULT_INJECTION: forcing a failure. [ 3326.010704][T24880] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3326.025643][T24880] CPU: 1 PID: 24880 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3326.041293][T24880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3326.051337][T24880] Call Trace: [ 3326.051359][T24880] dump_stack+0x197/0x210 [ 3326.051382][T24880] should_fail.cold+0xa/0x15 [ 3326.051402][T24880] ? fault_create_debugfs_attr+0x180/0x180 [ 3326.069371][T24880] ? ___might_sleep+0x163/0x2c0 [ 3326.074245][T24880] should_fail_alloc_page+0x50/0x60 [ 3326.079474][T24880] __alloc_pages_nodemask+0x1a1/0x910 [ 3326.084840][T24880] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3326.090745][T24880] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3326.096991][T24880] ? find_next_bit+0x107/0x130 [ 3326.101780][T24880] pcpu_populate_chunk+0xf8/0x940 [ 3326.106805][T24880] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3326.112515][T24880] ? find_next_bit+0xc7/0x130 [ 3326.117187][T24880] pcpu_alloc+0xd5b/0x1380 [ 3326.121622][T24880] ? pcpu_alloc_area+0x820/0x820 [ 3326.126552][T24880] __alloc_percpu_gfp+0x28/0x30 [ 3326.131399][T24880] array_map_alloc+0x698/0x7d0 [ 3326.136154][T24880] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3326.142048][T24880] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3326.148300][T24880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3326.151842][T24868] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3326.154535][T24880] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3326.154553][T24880] __do_sys_bpf+0x478/0x37b0 [ 3326.154574][T24880] ? bpf_prog_load+0x18a0/0x18a0 [ 3326.154589][T24880] ? __kasan_check_write+0x14/0x20 [ 3326.154606][T24880] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3326.154630][T24880] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3326.194650][T24880] ? wait_for_completion+0x440/0x440 [ 3326.199956][T24880] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3326.206214][T24880] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3326.211688][T24880] ? do_syscall_64+0x26/0x790 [ 3326.216369][T24880] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3326.222437][T24880] ? do_syscall_64+0x26/0x790 [ 3326.227127][T24880] __x64_sys_bpf+0x73/0xb0 [ 3326.231546][T24880] do_syscall_64+0xfa/0x790 [ 3326.236057][T24880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3326.241980][T24880] RIP: 0033:0x45a679 [ 3326.245970][T24880] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3326.265575][T24880] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3326.273976][T24880] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3326.281945][T24880] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3326.289923][T24880] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 10:40:04 executing program 2 (fault-call:0 fault-nth:30): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3326.297897][T24880] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3326.305858][T24880] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3326.408569][T24886] FAULT_INJECTION: forcing a failure. [ 3326.408569][T24886] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3326.429225][T24886] CPU: 0 PID: 24886 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3326.437589][T24886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3326.447795][T24886] Call Trace: [ 3326.447822][T24886] dump_stack+0x197/0x210 [ 3326.447843][T24886] should_fail.cold+0xa/0x15 [ 3326.447862][T24886] ? fault_create_debugfs_attr+0x180/0x180 [ 3326.447883][T24886] ? ___might_sleep+0x163/0x2c0 [ 3326.460239][T24886] should_fail_alloc_page+0x50/0x60 [ 3326.472065][T24874] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3326.476067][T24886] __alloc_pages_nodemask+0x1a1/0x910 [ 3326.476090][T24886] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3326.476114][T24886] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3326.494191][T24874] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3326.495239][T24886] ? find_next_bit+0x107/0x130 [ 3326.495263][T24886] pcpu_populate_chunk+0xf8/0x940 [ 3326.495279][T24886] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3326.495292][T24886] ? find_next_bit+0xc7/0x130 [ 3326.495313][T24886] pcpu_alloc+0xd5b/0x1380 [ 3326.495336][T24886] ? pcpu_alloc_area+0x820/0x820 [ 3326.539369][T24886] __alloc_percpu_gfp+0x28/0x30 [ 3326.544230][T24886] array_map_alloc+0x698/0x7d0 [ 3326.549001][T24886] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3326.554683][T24886] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3326.561729][T24886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3326.568067][T24886] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3326.573717][T24886] __do_sys_bpf+0x478/0x37b0 [ 3326.578329][T24886] ? bpf_prog_load+0x18a0/0x18a0 [ 3326.578344][T24886] ? __kasan_check_write+0x14/0x20 [ 3326.578357][T24886] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3326.578376][T24886] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3326.588399][T24886] ? wait_for_completion+0x440/0x440 [ 3326.588420][T24886] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3326.588446][T24886] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3326.588464][T24886] ? do_syscall_64+0x26/0x790 [ 3326.621151][T24886] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3326.627296][T24886] ? do_syscall_64+0x26/0x790 [ 3326.632023][T24886] __x64_sys_bpf+0x73/0xb0 [ 3326.637298][T24886] do_syscall_64+0xfa/0x790 [ 3326.641969][T24886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3326.647848][T24886] RIP: 0033:0x45a679 [ 3326.651772][T24886] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3326.671464][T24886] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3326.679882][T24886] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3326.688053][T24886] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3326.696010][T24886] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3326.703974][T24886] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3326.711935][T24886] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 10:40:12 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1", 0x2d}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:40:12 executing program 3: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x10790, 0x0, 0xad9, 0x9, 0x462f, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r11 = openat$cgroup_ro(r10, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) sendmsg$kcm(r11, &(0x7f00000002c0)={&(0x7f0000000680)=@in6={0xa, 0x4e23, 0x4, @loopback, 0x2}, 0x80, &(0x7f0000001c80)=[{&(0x7f0000000780)="7fd6d6417f6150c2a1dfcc67d28fd7c9fb390cbc9c24140207eb3d93523b348c4619f5e9791ae1f1d3a5d8b4eda942ee53b303252babdfa1c879525aa2cb8125168556e5a8ce433cd89669bf9f25ceb4cbdef27a933c921cc9a0d0db629eccb43718b85169aa83cef4ed44c143c432ca6f7f195d280d1d9298351aa14a15a0555d27ef20e395bd1683a213c5bc00503b51338849bcb5f1bb785350f0dba1db8a20fe2fecdf5e7c8820a009db828c0c7cd7f519dff1527b2bda651e35b683917687da7f70acad85f9426c4ee147f81e", 0xcf}, {&(0x7f0000000440)="e4cbdc4b2d0613b1b7053a4958176d343d8055cffaae650a673405aac83288af332511373996ecd1e9e5119a4144c455f7756003bde97294a85f4482f27f0b2a65425e8cd7c309fd3f173ffc3fe98b380d9d8e845ff4ca2a", 0x58}, {&(0x7f0000000880)="5ac7056a2d4378d6938aee6593cb3ed2a109b6dcad497162ec12bbbccfc4a367331ee4a7c4092aeb9c52dddd66b1aebe4957691a2ec8567de13a613190d095e66f795e1059fea361487be90bcace0455a5fd9325da26b3dcc343dcb09af202ef8ba098c9f4e09d", 0x67}, {&(0x7f0000000900)="a47722998a4c81a2eb4068042d8c9887dadd270ca4acec07da59a4b1e9efeb098be04067d0d797abeb868741aec90b33516d4358277992443692ddd42dc1ce573bec1177da431658813323836812a19f9e182ab17453b4d3e5e3e23c032830e78dc15e1c17074147ac4d77c83fec77ea0716c47ac8592bec7f5ce48f2311722df705e9f52994abed66dba141316d11a4767f99251a183075c9468b056a522b049185e590e27d934ef599a66e82a7a34bcf6e3d7c1d1254c890712428e864cc5dc15e7c7aa593e6039eba7d06888c3c5ff3bdaace843e961352a226eb647a92", 0xdf}, {0x0}, {&(0x7f0000000700)="605888c8268e3ef7f8a6da1b496e29ebab1b095f46846808f980fcc9ffc0b89696a1373c2da2eaa8c0d6334ef33101e5b24abad2ab46b0d55bfef0", 0x3b}, {&(0x7f0000000a00)="bc4031660dcbfea099744f60c1ba5aee4c7a56036f4278f02b2147e3c70885e72fba0f6f9ab5766f15113bc069cd110c457f6cdeb5c5e0f918a6c3c92328866c62114f6eab9457cb5470ee6e3fbe1516b4b451", 0x53}, {&(0x7f0000000a80)="29efd74253cee67f0a8967d849bc67a87fbf530cd5fe5a3c7ce3af774292c868d678dab84eb1d9547da6145d445489926fc70c07d46a7a1b4a12119c80", 0x3d}], 0x8}, 0x40004) ioctl$TUNGETVNETHDRSZ(r11, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r11, 0x0, 0xf800000000000000) r12 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x10, r11, 0x1) r13 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0xccd, 0x0, 0x3, 0x0, 0x1f, 0x1000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xd}, 0x0, 0x40000000000000, 0x3, 0x3}, r13, 0xe, r12, 0xa6f54f15e4426112) r14 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r13, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r14, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r15, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r15, &(0x7f0000000740)=ANY=[@ANYBLOB="0070696473202d696f202d706964000032bfe3721a9e4da0fed192d578d971ccc474e2cae8dff1ed122c20928d954661048b285a95fd08e522c0f1577bca5cc4091d26b6e11f3fc26c3b2b7cb8143726082c983ab12c35d1d1c3d3a729879f48bb062dda940a26218417053c66158da2de3f5dd04580c023f303911aab6df845055fe4a9495bc64ca6b4d6c3ad1672b4114d5acef2fd7b8bfb7dc4b285867768076adfadd7d8b802b6dba7b0f8eb14a108e4d96dba07cb3c1bae9996f05435637419a165eac427383918241674171b03e234e917c61600051bd5df644cad0a99b7bceb58093a88d8ec84c9d3c5db21b48c4c3aad94d1bcf8d495846df840480213fc87a69e7c234b9e07b59ddd86211e5e0a71a4dbd589df8d05993c9ae65aca790894e07c5f892024bb48eceb51d50c1271d26549657841a9ea73d7fa461edc3715ffb106907a9b6d127177e19a2d88279227a0e9672af9"], 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r16 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r16, 0x401054d6, 0x0) 10:40:12 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\xbep\x01\x00', 0x4009}) 10:40:12 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000980)=ANY=[@ANYBLOB="0070696473202d896f202d70696473205390d7e809819e91c5cd268ca2c8826657bd7e52259791f8f6dd7413b7687b34365cc2dbcba589eff9175c20b1738c43e9ed46e7e254277f7a6765ba4e4caae74cb6582b0dafaefdd8c5230ea9bb11ee0a5e8366235d2b582fcb028aa440f66da8578fe825b34cc8f21aee52"], 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:40:12 executing program 2 (fault-call:0 fault-nth:31): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:40:12 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x1f, 0x20000000000001, 0x0, 0x0}, 0x3c) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000300)=r2, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r2, 0x0, &(0x7f0000000040)}, 0x20) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000340)={0x4, &(0x7f0000000280)=[{0x0, 0x7, 0xfb, 0x9}, {0x200, 0x1, 0x81, 0x2}, {0x2264, 0xf9, 0x3f, 0xc1e}, {0x3ff, 0xb1, 0x7, 0x9}]}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r2, &(0x7f0000000000), &(0x7f0000000080)=""/161}, 0x18) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f0000000380)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000001740)=[{&(0x7f00000003c0)="899f547857f1baa8bebeaf51eca68562ccf5ae72d78f991c922aa1638d8cd38f9edf3a0aeac49b15b819df2f6cab29ee745c1e230402285632244ce84545", 0x3e}, {&(0x7f0000000400)="9865683d2bd6d0dd6710176814e814922955afc4eb69248c64e122c441c241d099ed16d81b78835c27e0ececdd1976af8482ad19ddd2f29b31fdc7aa1897b47dea4647ebc313a42eab6f9fa8c061056d484e1b9ce4291fc4c99cba8978a132fa259ef84d7d3c74649a3f165596b1a9a53aca2a0de8a3a9ac10dfef798d23c15f8b8dea8f062acbb8273ef58cd23b01cd155849c1b4f431833ad73aab23dbe68ec17c1fc9ff778d44dadc3ad04d1f4bbaff88a538df63bafb8ec0e2f3af4653a91d714b083c3ba52c9ddddca88fcdde1f83f8356123e82b7e2346d01782fb54087ea33fe3ac2bad9817c2a80ea24d1e6c", 0xf0}, {&(0x7f0000000500)="320149d4adce3d58cff5f931650d539274983335117f5bb7f3dc02ded8c3ce6d4bcf42f529b25afc61bc82b7f0047cb24126581af627acea7742dd58fe0bdf74ce4c46b0181c87cddf01f4f61b22a56af0ef3bb1ab067f3cfdec1b7c44e2cdad8e4ec4cd338e3fd4a2cacb87c8fe8124e0d3e7b269f3cdecb686729d5f20ad687470971fa78759d32228b0c72f37883e87b5f86af112d2d11618b9ac7be2f6feefc02282", 0xa4}, {&(0x7f00000005c0)="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", 0x1000}, {&(0x7f00000015c0)="098d3b8118bc9d3d4cd0bab2b765f966353d7d26a364507ab3e1b820a78fdb9b01dc81b9aaa30acea8496926d0573d", 0x2f}, {&(0x7f0000001600)="ce4d0f4b97ea12935c87d5f4d63e57d95d0d249e35e3e761d097e6b2bd723ab1daa8", 0x22}, {&(0x7f0000001640)="123b2ed8a08b4859af6f2f2d8aea0bf19563ba3707f3ebf2d2eda210c09b27adac42386315a7e971b37ca649eeb42ecb460ee27d897ee5eaa14e44ce3bc9ff22dddc46fa8f3d8aab1ebbedf5f9b967bd8e33e1a2b1aa926abed1b6115b23a447d740d7875e873c1d5a5c32d776d9e746afe4c2ab3fa4fac3c67387e640bdbc0d154fe9837ba9bef3b211a6a2b8b0d070156b1041997aa55aaeca1bf36cb9403571184ee929fed7dc46de15987f766b98af98020d87", 0xb5}, {&(0x7f0000001700)}], 0x8, &(0x7f00000017c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}], 0x18}, 0x4000) mkdir(&(0x7f0000001700)='./file0\x00', 0x71) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r3, 0x81}, 0xc) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r3, 0x2, 0x8}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r4, &(0x7f0000000180)="f7f81a518a5a6d2fe748ab38c99c461bc4610e60456e71213129d0a24c996f06b4c73f819c17466c6d48d16ea943bceff99ceb7995dd11d79767617a8a3ed7e4159d9aa07b84400a9e4ef86a0b723f6acc9fa4441afa2be1f958e1e8ccf671d6658820c59654cea6b1ae9071d49c147c849707aa14c04bddd8946a2717853998162479a0894d087699f6735094300cbb4c376b0a96bcfbbbd33608e292171e58d4f2ec4a546ecfdc72525c92626cb0d19a4709547e9b95bd3a4587b7742a3895c05fecf21416dca47220e843d55ddf", &(0x7f0000000080)="3f364202e49065e267476201b98e60936402210a25c29038d6c43702884a2e0350fbfcfafc2d2687ca7b231ae23222be940bd2191586914d735ca80fc64765c1f1279f2c89b9836a7005311b57", 0x2}, 0x20) [ 3334.183306][T24906] FAULT_INJECTION: forcing a failure. [ 3334.183306][T24906] name failslab, interval 1, probability 0, space 0, times 0 [ 3334.202455][T24906] CPU: 0 PID: 24906 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3334.210952][T24906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3334.221173][T24906] Call Trace: [ 3334.224477][T24906] dump_stack+0x197/0x210 [ 3334.228818][T24906] should_fail.cold+0xa/0x15 [ 3334.233409][T24906] ? fault_create_debugfs_attr+0x180/0x180 [ 3334.239200][T24906] ? ___might_sleep+0x163/0x2c0 [ 3334.244073][T24906] __should_failslab+0x121/0x190 [ 3334.248995][T24906] should_failslab+0x9/0x14 [ 3334.253501][T24906] kmem_cache_alloc_node_trace+0x274/0x750 [ 3334.259404][T24906] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3334.265164][T24906] ? apply_to_page_range+0x562/0x700 [ 3334.270474][T24906] __get_vm_area_node+0x12b/0x4f0 [ 3334.274178][T24907] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 3334.275507][T24906] __vmalloc_node_range+0xd4/0x810 [ 3334.275521][T24906] ? pcpu_mem_zalloc+0x8a/0xf0 [ 3334.275543][T24906] __vmalloc+0x44/0x50 [ 3334.283843][T24907] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3334.288696][T24906] ? pcpu_mem_zalloc+0x8a/0xf0 [ 3334.288712][T24906] pcpu_mem_zalloc+0x8a/0xf0 [ 3334.288728][T24906] pcpu_create_chunk+0x12d/0x7f0 [ 3334.288746][T24906] pcpu_alloc+0x10f3/0x1380 [ 3334.288771][T24906] ? pcpu_alloc_area+0x820/0x820 [ 3334.288796][T24906] __alloc_percpu_gfp+0x28/0x30 [ 3334.288811][T24906] array_map_alloc+0x698/0x7d0 [ 3334.288831][T24906] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3334.345311][T24906] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3334.351553][T24906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3334.357810][T24906] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3334.363426][T24906] __do_sys_bpf+0x478/0x37b0 [ 3334.368036][T24906] ? bpf_prog_load+0x18a0/0x18a0 [ 3334.372963][T24906] ? __kasan_check_write+0x14/0x20 [ 3334.378096][T24906] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3334.383631][T24906] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3334.388918][T24906] ? wait_for_completion+0x440/0x440 [ 3334.394361][T24906] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3334.400612][T24906] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3334.406088][T24906] ? do_syscall_64+0x26/0x790 [ 3334.410765][T24906] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3334.416816][T24906] ? do_syscall_64+0x26/0x790 [ 3334.421495][T24906] __x64_sys_bpf+0x73/0xb0 [ 3334.426057][T24906] do_syscall_64+0xfa/0x790 [ 3334.430635][T24906] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3334.436514][T24906] RIP: 0033:0x45a679 [ 3334.440400][T24906] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3334.459994][T24906] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3334.468547][T24906] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3334.476523][T24906] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3334.484477][T24906] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3334.492529][T24906] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3334.500485][T24906] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 10:40:12 executing program 3: 10:40:12 executing program 2 (fault-call:0 fault-nth:32): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3334.538080][T24900] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3334.546512][T24900] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3334.660566][T24919] FAULT_INJECTION: forcing a failure. [ 3334.660566][T24919] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3334.697649][T24919] CPU: 1 PID: 24919 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3334.706029][T24919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3334.716192][T24919] Call Trace: [ 3334.719503][T24919] dump_stack+0x197/0x210 [ 3334.723855][T24919] should_fail.cold+0xa/0x15 [ 3334.725242][T24900] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3334.728471][T24919] ? fault_create_debugfs_attr+0x180/0x180 [ 3334.728488][T24919] ? ___might_sleep+0x163/0x2c0 [ 3334.728516][T24919] should_fail_alloc_page+0x50/0x60 [ 3334.728533][T24919] __alloc_pages_nodemask+0x1a1/0x910 [ 3334.728547][T24919] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 3334.728566][T24919] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3334.728591][T24919] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3334.728614][T24919] alloc_pages_current+0x107/0x210 [ 3334.762624][T24900] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3334.763370][T24919] ? ___might_sleep+0x163/0x2c0 [ 3334.793240][T24919] __vmalloc_node_range+0x4f8/0x810 [ 3334.798457][T24919] __vmalloc+0x44/0x50 [ 3334.802523][T24919] ? pcpu_mem_zalloc+0x8a/0xf0 [ 3334.807291][T24919] pcpu_mem_zalloc+0x8a/0xf0 [ 3334.811883][T24919] pcpu_create_chunk+0x196/0x7f0 [ 3334.816990][T24919] pcpu_alloc+0x10f3/0x1380 [ 3334.821523][T24919] ? pcpu_alloc_area+0x820/0x820 [ 3334.826479][T24919] __alloc_percpu_gfp+0x28/0x30 [ 3334.831333][T24919] array_map_alloc+0x698/0x7d0 [ 3334.836079][T24919] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3334.841726][T24919] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3334.847960][T24919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3334.854304][T24919] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3334.859947][T24919] __do_sys_bpf+0x478/0x37b0 [ 3334.864689][T24919] ? bpf_prog_load+0x18a0/0x18a0 [ 3334.869611][T24919] ? __kasan_check_write+0x14/0x20 [ 3334.874706][T24919] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3334.880266][T24919] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3334.885562][T24919] ? wait_for_completion+0x440/0x440 [ 3334.890894][T24919] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3334.897123][T24919] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3334.902573][T24919] ? do_syscall_64+0x26/0x790 [ 3334.907310][T24919] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3334.913375][T24919] ? do_syscall_64+0x26/0x790 [ 3334.918063][T24919] __x64_sys_bpf+0x73/0xb0 [ 3334.922493][T24919] do_syscall_64+0xfa/0x790 [ 3334.926994][T24919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3334.932865][T24919] RIP: 0033:0x45a679 [ 3334.936742][T24919] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:40:13 executing program 3: 10:40:13 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r9, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) [ 3334.956507][T24919] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3334.964917][T24919] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3334.972873][T24919] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3334.980836][T24919] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3334.988799][T24919] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3334.996748][T24919] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 10:40:13 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\xbfp\x01\x00', 0x4009}) 10:40:13 executing program 2 (fault-call:0 fault-nth:33): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) [ 3335.158730][T24936] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3335.166852][T24936] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3335.213637][T24940] FAULT_INJECTION: forcing a failure. [ 3335.213637][T24940] name failslab, interval 1, probability 0, space 0, times 0 [ 3335.235169][T24940] CPU: 1 PID: 24940 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3335.243529][T24940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3335.253580][T24940] Call Trace: [ 3335.256855][T24940] dump_stack+0x197/0x210 [ 3335.261172][T24940] should_fail.cold+0xa/0x15 [ 3335.265745][T24940] ? fault_create_debugfs_attr+0x180/0x180 [ 3335.271536][T24940] ? ___might_sleep+0x163/0x2c0 [ 3335.276371][T24940] __should_failslab+0x121/0x190 [ 3335.281302][T24940] should_failslab+0x9/0x14 [ 3335.285791][T24940] __kmalloc+0x2e0/0x770 [ 3335.290026][T24940] ? memset+0x40/0x40 [ 3335.294009][T24940] ? pcpu_get_vm_areas+0x3d5/0x3ec0 [ 3335.299199][T24940] pcpu_get_vm_areas+0x3d5/0x3ec0 [ 3335.304216][T24940] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3335.310440][T24940] ? __vmalloc_node_range+0x4d7/0x810 [ 3335.315813][T24940] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3335.322058][T24940] pcpu_create_chunk+0x24e/0x7f0 [ 3335.326975][T24940] pcpu_alloc+0x10f3/0x1380 [ 3335.331461][T24940] ? pcpu_alloc_area+0x820/0x820 [ 3335.336384][T24940] __alloc_percpu_gfp+0x28/0x30 [ 3335.341212][T24940] array_map_alloc+0x698/0x7d0 [ 3335.345962][T24940] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3335.351578][T24940] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3335.357805][T24940] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3335.364033][T24940] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3335.369862][T24940] __do_sys_bpf+0x478/0x37b0 [ 3335.374438][T24940] ? bpf_prog_load+0x18a0/0x18a0 [ 3335.379378][T24940] ? __kasan_check_write+0x14/0x20 [ 3335.384491][T24940] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3335.390025][T24940] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3335.395304][T24940] ? wait_for_completion+0x440/0x440 [ 3335.400590][T24940] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3335.406830][T24940] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3335.412543][T24940] ? do_syscall_64+0x26/0x790 [ 3335.417207][T24940] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3335.423262][T24940] ? do_syscall_64+0x26/0x790 [ 3335.427939][T24940] __x64_sys_bpf+0x73/0xb0 [ 3335.432359][T24940] do_syscall_64+0xfa/0x790 [ 3335.436869][T24940] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3335.442768][T24940] RIP: 0033:0x45a679 [ 3335.446644][T24940] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3335.466239][T24940] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3335.474636][T24940] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3335.482598][T24940] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3335.490550][T24940] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3335.498588][T24940] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3335.506556][T24940] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3335.554547][T24929] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3335.563822][T24929] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 10:40:17 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1", 0x2d}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r8, r9, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r10, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) 10:40:17 executing program 3: 10:40:17 executing program 2 (fault-call:0 fault-nth:34): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:40:17 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7947c101e4600800000efff065900001943449fc1dcf8af027400005822e8f98b2b4077445b2fef3efddc547d08d3f4215a73e8d9ffcd60ac4807eafef8078a0f219e25e2a0e0a729aa6d43bc1107b9cf2a89a797cd5c578f0000000000000000000000000000000000000056a62e5a1aa8fb8856e1e0333a81dc43d3baea26962ade38de04079dd4dabb0f32ba9b6ca4d5c2247c1621b8a5f49fbf922256de3b9579ae270980003cabc10d38e4ffd7bd80080f53ca9e4127035460328f4b77e121254b0313a191ec0dc15a949dd272f38d32e06f864aa93a0cf2df860a36f952717c788e56fa0e00000e22cddb2310acdf7d25b3f00d49b8b87ceb3d9eb49e58aa8fb3638d4036905bbf66c3b0de83568bdd2e8afdf6f80600000000000000000000000000000000000000b2d980d9714429b928c4b9eeff737a645fea18800d9e1d97e28c593694a0bec53608bcbed51d99987ead09b639bb9f7c6300ae0d556d16334413a8a80e440a3c5e89734ba69bdb6b63c89e777bebae18c0b6ee92260506989430696df40dc6a1c168b3b91f464e67bc8bc44cf66f8e8c37c94cbab1abc01afbdb700299ea8908f94f0fceb5c5484d180f76024813eb213fc8f01ef9b57d2158c6831aa373783995b0e84fdfdfb7a5048679bd2c32bba5763fcc15143d3d18166f752390bbb3c3fc0ee660b9a412be819af0"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:40:17 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\xc0p\x01\x00', 0x4009}) [ 3339.288553][T24956] FAULT_INJECTION: forcing a failure. [ 3339.288553][T24956] name failslab, interval 1, probability 0, space 0, times 0 [ 3339.293820][T24953] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3339.309735][T24956] CPU: 1 PID: 24956 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3339.315509][T24953] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3339.318075][T24956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3339.318081][T24956] Call Trace: [ 3339.318105][T24956] dump_stack+0x197/0x210 [ 3339.318128][T24956] should_fail.cold+0xa/0x15 [ 3339.318149][T24956] ? fault_create_debugfs_attr+0x180/0x180 [ 3339.318167][T24956] ? ___might_sleep+0x163/0x2c0 [ 3339.318185][T24956] __should_failslab+0x121/0x190 [ 3339.318200][T24956] should_failslab+0x9/0x14 [ 3339.318215][T24956] __kmalloc+0x2e0/0x770 [ 3339.318228][T24956] ? memset+0x40/0x40 [ 3339.318244][T24956] ? pcpu_get_vm_areas+0x3ec/0x3ec0 [ 3339.318264][T24956] pcpu_get_vm_areas+0x3ec/0x3ec0 [ 3339.318279][T24956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3339.318293][T24956] ? __vmalloc_node_range+0x4d7/0x810 [ 3339.318323][T24956] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3339.318341][T24956] pcpu_create_chunk+0x24e/0x7f0 [ 3339.409989][T24956] pcpu_alloc+0x10f3/0x1380 [ 3339.414493][T24956] ? pcpu_alloc_area+0x820/0x820 [ 3339.419429][T24956] __alloc_percpu_gfp+0x28/0x30 [ 3339.424287][T24956] array_map_alloc+0x698/0x7d0 [ 3339.429057][T24956] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3339.434698][T24956] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3339.441289][T24956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3339.447523][T24956] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3339.453173][T24956] __do_sys_bpf+0x478/0x37b0 [ 3339.457832][T24956] ? bpf_prog_load+0x18a0/0x18a0 [ 3339.462765][T24956] ? __kasan_check_write+0x14/0x20 [ 3339.467868][T24956] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3339.473415][T24956] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3339.478702][T24956] ? wait_for_completion+0x440/0x440 [ 3339.483972][T24956] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3339.490220][T24956] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3339.495668][T24956] ? do_syscall_64+0x26/0x790 [ 3339.500334][T24956] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3339.506377][T24956] ? do_syscall_64+0x26/0x790 [ 3339.511049][T24956] __x64_sys_bpf+0x73/0xb0 [ 3339.515463][T24956] do_syscall_64+0xfa/0x790 [ 3339.519963][T24956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3339.525892][T24956] RIP: 0033:0x45a679 [ 3339.529792][T24956] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3339.549399][T24956] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3339.557935][T24956] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3339.565896][T24956] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3339.573935][T24956] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3339.581895][T24956] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3339.589859][T24956] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3339.704603][T24959] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3339.715312][T24959] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 10:40:23 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) recvmsg$kcm(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000040)=""/155, 0x9b}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000000100)=""/46, 0x2e}, {&(0x7f0000001180)=""/75, 0x4b}, {&(0x7f0000001200)=""/196, 0xc4}], 0x5, &(0x7f0000001380)=""/211, 0xd3}, 0x40000080) close(r1) 10:40:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4c000000}, [@call={0x4f, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:40:23 executing program 2 (fault-call:0 fault-nth:35): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:40:23 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x23, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa2, 0x4}, 0x6421, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000980)={0x5, 0x70, 0xe8, 0x0, 0xfe, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffbff, 0x2, @perf_config_ext={0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd}, 0x0, 0x3, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7947c101e4600800000efff065900001943449fc1dcf86e0008d70000000000c6b5af027400005822e8f98b2b4077445b2fef3efddc547d08d3f4215a73e8d9ffcd60ac4807eafef8078a0f219e25e2a0e0a729aa6d43bc1107b9cf2a89a797cd5c578f0000000000000000000000000000000000000056a62e5a1aa8fb8856e1e0333a81dc43d3baea26962ade38deb5629dd4dabb0f32ba9b6ca4d5c2247c1621b8a5f49fbf922256de3b9579ae270980003cabc10d38e4ffd7bd80080f53ca9e4127035460328f4b77e121254b0313a191ec0dc15a949dd272f38d32e06f864aa93a0cf2df860a36f952717c788e5617a566440e22cddb2310acdf7d25b3f00d49b8b87ceb3d9eb49e58aa8fb3638d4036905bbf66c3b0de83568bdd2e8afdf6f80600000000000000000000000000000000000000b2d980d9714429b928c4b9eeff737a645fea18800d9e1d97e28c593694a0bec53608bcbed51d99987ead09b639bb9f7c6300ae0d556d16334413a8a80e440a3c5e89734ba69bdb6b63c89e777bebae18c0b6ee92260506989430696df40dc6a1c168b3b91f464e67bc8bc44cf66f8e8c37c94cbab1abc01afbdb700299ea8908f94f0fceb5c5484d180f76024813eb213fc8f01ef9b57d2158c6831aa373783995b0e84fdfdfb7a5048679bd2c32bba5763fcc15143d3d18166f752390bbb3c3fc0ee660b9a412be819af0"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:40:23 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\xc1p\x01\x00', 0x4009}) [ 3345.521416][T24979] FAULT_INJECTION: forcing a failure. [ 3345.521416][T24979] name failslab, interval 1, probability 0, space 0, times 0 [ 3345.544960][T24979] CPU: 1 PID: 24979 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3345.553321][T24979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3345.563384][T24979] Call Trace: [ 3345.566691][T24979] dump_stack+0x197/0x210 10:40:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 3345.571043][T24979] should_fail.cold+0xa/0x15 [ 3345.575662][T24979] ? fault_create_debugfs_attr+0x180/0x180 [ 3345.581473][T24979] ? ___might_sleep+0x163/0x2c0 [ 3345.581496][T24979] __should_failslab+0x121/0x190 [ 3345.581515][T24979] should_failslab+0x9/0x14 [ 3345.581534][T24979] kmem_cache_alloc_trace+0x2d3/0x790 [ 3345.581550][T24979] ? kmem_cache_alloc+0x364/0x710 [ 3345.581563][T24979] ? memset+0x40/0x40 [ 3345.581578][T24979] ? pcpu_get_vm_areas+0x3ec/0x3ec0 [ 3345.581597][T24979] pcpu_get_vm_areas+0x4d6/0x3ec0 [ 3345.594658][T24979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3345.594676][T24979] ? __vmalloc_node_range+0x4d7/0x810 [ 3345.594709][T24979] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3345.594728][T24979] pcpu_create_chunk+0x24e/0x7f0 [ 3345.625469][T24982] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3345.630006][T24979] pcpu_alloc+0x10f3/0x1380 [ 3345.630028][T24979] ? pcpu_alloc_area+0x820/0x820 [ 3345.630052][T24979] __alloc_percpu_gfp+0x28/0x30 [ 3345.630067][T24979] array_map_alloc+0x698/0x7d0 [ 3345.630086][T24979] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3345.630103][T24979] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3345.630114][T24979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3345.630135][T24979] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3345.635686][T24982] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3345.641745][T24979] __do_sys_bpf+0x478/0x37b0 [ 3345.641767][T24979] ? bpf_prog_load+0x18a0/0x18a0 [ 3345.641782][T24979] ? __kasan_check_write+0x14/0x20 [ 3345.641797][T24979] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3345.641811][T24979] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3345.641825][T24979] ? wait_for_completion+0x440/0x440 [ 3345.641845][T24979] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3345.641869][T24979] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3345.641889][T24979] ? do_syscall_64+0x26/0x790 [ 3345.752965][T24979] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3345.759015][T24979] ? do_syscall_64+0x26/0x790 [ 3345.763680][T24979] __x64_sys_bpf+0x73/0xb0 [ 3345.768080][T24979] do_syscall_64+0xfa/0x790 [ 3345.772577][T24979] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3345.778448][T24979] RIP: 0033:0x45a679 [ 3345.782331][T24979] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3345.801928][T24979] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3345.810327][T24979] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 10:40:24 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x3c) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={r0, 0x0, 0x0}, 0x20) [ 3345.818290][T24979] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3345.826240][T24979] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3345.834203][T24979] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3345.842168][T24979] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3345.912227][T24978] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3345.931246][T24978] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 10:40:30 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r4 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x4) r6 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r7 = gettid() r8 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r7, r8, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r9, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r10, 0x401054d6, 0x0) 10:40:30 executing program 2 (fault-call:0 fault-nth:36): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:40:30 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:40:30 executing program 3: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000980)=ANY=[@ANYBLOB="0070696473202d896f202d70696473205390d7e809819e91c5cd268ca2c8826657bd7e52259791f8f6dd7413b7687b34365cc2dbcba589eff9175c20b1738c43e9ed46e7e254277f7a6765ba4e4caae74cb6582b0dafaefdd8c5230ea9bb11ee0a5e8366235d2b582fcb028aa440f66da8578fe825b34cc8f21aee52"], 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 10:40:30 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\xc2p\x01\x00', 0x4009}) [ 3352.637944][T25007] FAULT_INJECTION: forcing a failure. [ 3352.637944][T25007] name failslab, interval 1, probability 0, space 0, times 0 [ 3352.652205][T25007] CPU: 0 PID: 25007 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3352.660663][T25007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3352.670703][T25007] Call Trace: [ 3352.673981][T25007] dump_stack+0x197/0x210 [ 3352.678449][T25007] should_fail.cold+0xa/0x15 [ 3352.683221][T25007] ? fault_create_debugfs_attr+0x180/0x180 [ 3352.689036][T25007] ? ___might_sleep+0x163/0x2c0 [ 3352.693877][T25007] __should_failslab+0x121/0x190 [ 3352.698901][T25007] should_failslab+0x9/0x14 [ 3352.703454][T25007] kmem_cache_alloc_trace+0x2d3/0x790 [ 3352.708816][T25007] ? kmem_cache_alloc+0x364/0x710 [ 3352.713820][T25007] ? memset+0x40/0x40 [ 3352.717784][T25007] ? pcpu_get_vm_areas+0x3ec/0x3ec0 [ 3352.722975][T25007] pcpu_get_vm_areas+0x4d6/0x3ec0 [ 3352.728182][T25007] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3352.739370][T25007] ? __vmalloc_node_range+0x4d7/0x810 [ 3352.744737][T25007] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3352.751012][T25007] pcpu_create_chunk+0x24e/0x7f0 [ 3352.755936][T25007] pcpu_alloc+0x10f3/0x1380 [ 3352.760490][T25007] ? pcpu_alloc_area+0x820/0x820 [ 3352.765462][T25007] __alloc_percpu_gfp+0x28/0x30 [ 3352.770294][T25007] array_map_alloc+0x698/0x7d0 [ 3352.775078][T25007] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3352.780693][T25007] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3352.786911][T25007] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3352.793137][T25007] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3352.798763][T25007] __do_sys_bpf+0x478/0x37b0 [ 3352.803334][T25007] ? bpf_prog_load+0x18a0/0x18a0 [ 3352.808253][T25007] ? __kasan_check_write+0x14/0x20 [ 3352.813340][T25007] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3352.818864][T25007] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3352.824129][T25007] ? wait_for_completion+0x440/0x440 [ 3352.829399][T25007] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3352.835637][T25007] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3352.841073][T25007] ? do_syscall_64+0x26/0x790 [ 3352.845728][T25007] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3352.851783][T25007] ? do_syscall_64+0x26/0x790 [ 3352.856444][T25007] __x64_sys_bpf+0x73/0xb0 [ 3352.860842][T25007] do_syscall_64+0xfa/0x790 [ 3352.865327][T25007] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3352.871199][T25007] RIP: 0033:0x45a679 [ 3352.875071][T25007] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3352.894654][T25007] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3352.903044][T25007] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3352.910997][T25007] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3352.918944][T25007] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3352.926893][T25007] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3352.934844][T25007] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3352.995933][T25008] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3353.011180][T25008] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 3353.027682][T25005] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 3353.035869][T25005] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 10:40:32 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\xc3p\x01\x00', 0x4009}) 10:40:32 executing program 2 (fault-call:0 fault-nth:37): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x12, 0x0, 0x0, 0x400100]}, 0x3c) 10:40:32 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bcsf0\x00', 0x4009}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) close(r1) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) 10:40:32 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) sendmsg$kcm(r5, &(0x7f00000002c0)={&(0x7f0000000680)=@in6={0xa, 0x4e23, 0x4, @loopback, 0x2}, 0x80, &(0x7f0000001c80)=[{&(0x7f0000000780)="7fd6d6417f6150c2a1dfcc67d28fd7c9fb390cbc9c24140207eb3d93523b348c4619f5e9791ae1f1d3a5d8b4eda942ee53b303252babdfa1c879525aa2cb8125168556e5a8ce433cd89669bf9f25ceb4cbdef27a933c921cc9a0d0db629eccb43718b85169aa83cef4ed44c143c432ca6f7f195d280d1d9298351aa14a15a0555d27ef20e395bd1683a213c5bc00503b51338849bcb5f1bb785350f0dba1db8a20fe2fecdf5e7c8820a009db828c0c7cd7f519dff1527b2bda651e35b683917687da7f70acad85f9426c4ee147f81e", 0xcf}, {&(0x7f0000000440)="e4cbdc4b2d0613b1b7053a4958176d343d8055cffaae650a673405aac83288af332511373996ecd1e9e5119a4144c455f7756003bde97294a85f4482f27f0b2a65425e8cd7c309fd3f173ffc3fe98b380d9d8e845ff4ca2a", 0x58}, {&(0x7f0000000880)="5ac7056a2d4378d6938aee6593cb3ed2a109b6dcad497162ec12bbbccfc4a367331ee4a7c4092aeb9c52dddd66b1aebe4957691a2ec8567de13a613190d095e66f795e1059fea361487be90bcace0455a5fd9325da26b3dcc343dcb09af202ef8ba098c9f4e09d", 0x67}, {&(0x7f0000000900)="a47722998a4c81a2eb4068042d8c9887dadd270ca4acec07da59a4b1e9efeb098be04067d0d797abeb868741aec90b33516d4358277992443692ddd42dc1ce573bec1177da431658813323836812a19f9e182ab17453b4d3e5e3e23c032830e78dc15e1c17074147ac4d77c83fec77ea0716c47ac8592bec7f5ce48f2311722df705e9f52994abed66dba141316d11a4767f99251a183075c9468b056a522b049185e590e27d934ef599a66e82a7a34bcf6e3d7c1d1254c890712428e864cc5dc15e7c7aa593e6039eba7d06888c3c5ff3bdaace843e961352a226eb647a92", 0xdf}, {0x0}, {&(0x7f0000000700)="605888c8268e3ef7f8a6da1b496e29ebab1b095f46846808f980fcc9ffc0b89696a1373c2da2eaa8c0d6334ef33101e5b24abad2ab46b0d55bfef0", 0x3b}, {&(0x7f0000000a00)="bc4031660dcbfea099744f60c1ba5aee4c7a56036f4278f02b2147e3c70885e72fba0f6f9ab5766f15113bc069cd110c457f6cdeb5c5e0f918a6c3c92328866c62114f6eab9457cb5470ee6e3fbe1516b4b451", 0x53}, {&(0x7f0000000a80)="29efd74253cee67f0a8967d849bc67a87fbf530cd5fe5a3c7ce3af774292c868d678dab84eb1d9547da6145d445489926fc70c07d46a7a1b4a12119c80", 0x3d}], 0x8}, 0x40004) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) r6 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x10, r5, 0x1) r7 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0xccd, 0x0, 0x3, 0x0, 0x1f, 0x1000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xd}, 0x0, 0x40000000000000, 0x3, 0x3}, r7, 0xe, r6, 0xa6f54f15e4426112) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={r7, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000580)='pids', 0xffffffffffffffff}, 0x30) r8 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x1) close(r3) socket$kcm(0x2, 0x0, 0x2) r9 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r10, 0x400454d0, 0x4) r11 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r11, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r13 = gettid() r14 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000980)=ANY=[@ANYBLOB="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"/557], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r13, r14, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r15, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r15, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r12, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r16 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r16, 0x401054d6, 0x0) 10:40:32 executing program 3: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\xfe', 0x1ff) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x1e7, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc2420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x0, 0x2) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5600) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc00100002400a000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) r7 = perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x1f, 0x3f, 0x93, 0x0, 0x5, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0xa1, 0x4}, 0x200, 0x0, 0xad9, 0x9, 0x7bde, 0x10001, 0xfc00}, 0xffffffffffffffff, 0x2, r0, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0x45, 0x20, 0x21, 0x0, 0x0, 0x80, 0x4aa60, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0xfff, 0x7}, 0x4000, 0x3, 0x5, 0x0, 0x80000001, 0x3ff, 0x1f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r10, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r11, &(0x7f0000000300)={[{0x0, 'pids'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x10) openat$cgroup_ro(r8, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) [ 3354.705446][T25027] FAULT_INJECTION: forcing a failure. [ 3354.705446][T25027] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3354.728663][T25027] CPU: 1 PID: 25027 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3354.737256][T25027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3354.747315][T25027] Call Trace: [ 3354.750678][T25027] dump_stack+0x197/0x210 [ 3354.755015][T25027] should_fail.cold+0xa/0x15 [ 3354.759600][T25027] ? fault_create_debugfs_attr+0x180/0x180 [ 3354.765395][T25027] ? ___might_sleep+0x163/0x2c0 [ 3354.772247][T25027] should_fail_alloc_page+0x50/0x60 [ 3354.777433][T25027] __alloc_pages_nodemask+0x1a1/0x910 [ 3354.782788][T25027] ? find_held_lock+0x35/0x130 [ 3354.787537][T25027] ? __alloc_pages_slowpath+0x2920/0x2920 [ 3354.793242][T25027] ? lock_downgrade+0x920/0x920 [ 3354.798074][T25027] ? rwlock_bug.part.0+0x90/0x90 [ 3354.803005][T25027] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3354.809230][T25027] alloc_pages_current+0x107/0x210 [ 3354.814343][T25027] __get_free_pages+0xc/0x40 [ 3354.818930][T25027] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 3354.824586][T25027] apply_to_page_range+0x445/0x700 [ 3354.829786][T25027] ? memset+0x40/0x40 [ 3354.833786][T25027] kasan_populate_vmalloc+0x68/0x90 [ 3354.838986][T25027] pcpu_get_vm_areas+0x3c42/0x3ec0 [ 3354.844094][T25027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3354.850347][T25027] pcpu_create_chunk+0x24e/0x7f0 [ 3354.855271][T25027] pcpu_alloc+0x10f3/0x1380 [ 3354.859769][T25027] ? pcpu_alloc_area+0x820/0x820 [ 3354.864697][T25027] __alloc_percpu_gfp+0x28/0x30 [ 3354.869537][T25027] array_map_alloc+0x698/0x7d0 [ 3354.874308][T25027] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3354.879946][T25027] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3354.886176][T25027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3354.892407][T25027] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3354.898027][T25027] __do_sys_bpf+0x478/0x37b0 [ 3354.902602][T25027] ? bpf_prog_load+0x18a0/0x18a0 [ 3354.907520][T25027] ? __kasan_check_write+0x14/0x20 [ 3354.912613][T25027] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3354.918149][T25027] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3354.923417][T25027] ? wait_for_completion+0x440/0x440 [ 3354.928687][T25027] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3354.934920][T25027] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3354.940358][T25027] ? do_syscall_64+0x26/0x790 [ 3354.945017][T25027] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3354.951239][T25027] ? do_syscall_64+0x26/0x790 [ 3354.955902][T25027] __x64_sys_bpf+0x73/0xb0 [ 3354.960314][T25027] do_syscall_64+0xfa/0x790 [ 3354.964802][T25027] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3354.970676][T25027] RIP: 0033:0x45a679 [ 3354.974574][T25027] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3354.994159][T25027] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3355.002552][T25027] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3355.010509][T25027] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3355.018471][T25027] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3355.026425][T25027] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3355.034375][T25027] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3355.045174][T25027] ================================================================== [ 3355.053553][T25027] BUG: KASAN: vmalloc-out-of-bounds in pcpu_alloc+0x589/0x1380 [ 3355.061109][T25027] Write of size 32768 at addr ffffe8ffff800000 by task syz-executor.2/25027 [ 3355.061123][T25027] [ 3355.061142][T25027] CPU: 0 PID: 25027 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3355.061150][T25027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3355.061161][T25027] Call Trace: [ 3355.072156][T25027] dump_stack+0x197/0x210 [ 3355.072172][T25027] ? pcpu_alloc+0x589/0x1380 [ 3355.072193][T25027] print_address_description.constprop.0.cold+0x5/0x30b [ 3355.072209][T25027] ? pcpu_alloc+0x589/0x1380 [ 3355.090581][T25027] ? pcpu_alloc+0x589/0x1380 [ 3355.090598][T25027] __kasan_report.cold+0x1b/0x41 [ 3355.090614][T25027] ? pcpu_alloc+0x589/0x1380 [ 3355.090630][T25027] kasan_report+0x12/0x20 [ 3355.090644][T25027] check_memory_region+0x134/0x1a0 [ 3355.090657][T25027] memset+0x24/0x40 [ 3355.090671][T25027] pcpu_alloc+0x589/0x1380 [ 3355.090693][T25027] ? pcpu_alloc_area+0x820/0x820 [ 3355.090717][T25027] __alloc_percpu_gfp+0x28/0x30 [ 3355.098306][T25027] array_map_alloc+0x698/0x7d0 [ 3355.098328][T25027] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3355.098347][T25027] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3355.098360][T25027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3355.098376][T25027] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3355.098393][T25027] __do_sys_bpf+0x478/0x37b0 [ 3355.098412][T25027] ? bpf_prog_load+0x18a0/0x18a0 [ 3355.105306][T25028] kobject: 'queues' (0000000063de66c6): kobject_uevent_env [ 3355.109908][T25027] ? __kasan_check_write+0x14/0x20 [ 3355.109924][T25027] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3355.109939][T25027] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3355.109955][T25027] ? wait_for_completion+0x440/0x440 [ 3355.109976][T25027] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3355.124638][T25028] kobject: 'queues' (0000000063de66c6): kobject_uevent_env: filter function caused the event to drop! [ 3355.128636][T25027] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3355.128652][T25027] ? do_syscall_64+0x26/0x790 [ 3355.128669][T25027] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3355.128683][T25027] ? do_syscall_64+0x26/0x790 [ 3355.128702][T25027] __x64_sys_bpf+0x73/0xb0 [ 3355.128720][T25027] do_syscall_64+0xfa/0x790 [ 3355.138747][T25028] kobject: 'rx-0' (00000000063cf35b): kobject_add_internal: parent: 'queues', set: 'queues' [ 3355.141932][T25027] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3355.141945][T25027] RIP: 0033:0x45a679 [ 3355.141957][T25027] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3355.141970][T25027] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3355.151605][T25035] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 3355.156115][T25027] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3355.156128][T25027] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3355.162494][T25028] kobject: 'rx-0' (00000000063cf35b): kobject_uevent_env [ 3355.166568][T25027] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3355.166577][T25027] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3355.166586][T25027] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3355.166609][T25027] [ 3355.166618][T25027] [ 3355.173684][T25035] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3355.179225][T25027] Memory state around the buggy address: [ 3355.179257][T25027] BUG: unable to handle page fault for address: fffff91fffefffe0 [ 3355.179264][T25027] #PF: supervisor read access in kernel mode [ 3355.179270][T25027] #PF: error_code(0x0000) - not-present page [ 3355.179275][T25027] PGD 21ffe6067 P4D 21ffe6067 PUD aa56b067 PMD aa56c067 PTE 0 [ 3355.185335][T25028] kobject: 'rx-0' (00000000063cf35b): fill_kobj_path: path = '/devices/virtual/net/nr0Ăp/queues/rx-0' [ 3355.189758][T25027] Oops: 0000 [#1] PREEMPT SMP KASAN [ 3355.189773][T25027] CPU: 0 PID: 25027 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 3355.189780][T25027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3355.189799][T25027] RIP: 0010:memcpy_erms+0x6/0x10 [ 3355.189816][T25027] Code: cc cc cc cc eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe [ 3355.195110][T25028] kobject: 'tx-0' (0000000093c87e77): kobject_add_internal: parent: 'queues', set: 'queues' [ 3355.201897][T25027] RSP: 0018:ffffc900015f7990 EFLAGS: 00010082 [ 3355.201907][T25027] RAX: ffffc900015f799c RBX: fffff91fffefffe0 RCX: 0000000000000010 [ 3355.201916][T25027] RDX: 0000000000000010 RSI: fffff91fffefffe0 RDI: ffffc900015f799c [ 3355.201924][T25027] RBP: ffffc900015f79f0 R08: ffff8880a74dc1c0 R09: fffff520002bef38 [ 3355.201931][T25027] R10: fffff520002bef37 R11: ffffc900015f79be R12: fffff91ffff00000 [ 3355.201938][T25027] R13: 0000200000000000 R14: 00000000fffffffe R15: ffff88821fffd100 [ 3355.201949][T25027] FS: 00007f81400a5700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 3355.201957][T25027] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3355.201963][T25027] CR2: fffff91fffefffe0 CR3: 00000000a9ac9000 CR4: 00000000001406f0 [ 3355.201977][T25027] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3355.209522][T25028] kobject: 'tx-0' (0000000093c87e77): kobject_uevent_env [ 3355.212587][T25027] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 3355.212593][T25027] Call Trace: [ 3355.212611][T25027] ? print_shadow_for_address+0x91/0x117 [ 3355.212625][T25027] ? pcpu_alloc+0x589/0x1380 [ 3355.212633][T25027] ? pcpu_alloc+0x589/0x1380 [ 3355.212655][T25027] ? pcpu_alloc+0x589/0x1380 [ 3355.218497][T25028] kobject: 'tx-0' (0000000093c87e77): fill_kobj_path: path = '/devices/virtual/net/nr0Ăp/queues/tx-0' [ 3355.223303][T25027] ? pcpu_alloc+0x589/0x1380 [ 3355.223318][T25027] __kasan_report.cold+0x30/0x41 [ 3355.223335][T25027] ? pcpu_alloc+0x589/0x1380 [ 3355.630495][T25027] kasan_report+0x12/0x20 [ 3355.635334][T25027] check_memory_region+0x134/0x1a0 [ 3355.640426][T25027] memset+0x24/0x40 [ 3355.644214][T25027] pcpu_alloc+0x589/0x1380 [ 3355.648621][T25027] ? pcpu_alloc_area+0x820/0x820 [ 3355.653549][T25027] __alloc_percpu_gfp+0x28/0x30 [ 3355.658379][T25027] array_map_alloc+0x698/0x7d0 [ 3355.663124][T25027] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3355.668738][T25027] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3355.674968][T25027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3355.681197][T25027] ? cgroup_fd_array_put_ptr+0x2b0/0x2b0 [ 3355.690818][T25027] __do_sys_bpf+0x478/0x37b0 [ 3355.695398][T25027] ? bpf_prog_load+0x18a0/0x18a0 [ 3355.700318][T25027] ? __kasan_check_write+0x14/0x20 [ 3355.705423][T25027] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 3355.711044][T25027] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 3355.716311][T25027] ? wait_for_completion+0x440/0x440 [ 3355.721588][T25027] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3355.727817][T25027] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3355.733260][T25027] ? do_syscall_64+0x26/0x790 [ 3355.737920][T25027] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3355.743964][T25027] ? do_syscall_64+0x26/0x790 [ 3355.748624][T25027] __x64_sys_bpf+0x73/0xb0 [ 3355.753021][T25027] do_syscall_64+0xfa/0x790 [ 3355.757506][T25027] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3355.763374][T25027] RIP: 0033:0x45a679 [ 3355.767251][T25027] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3355.786848][T25027] RSP: 002b:00007f81400a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3355.795245][T25027] RAX: ffffffffffffffda RBX: 00007f81400a4c90 RCX: 000000000045a679 [ 3355.803201][T25027] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 3355.811151][T25027] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3355.819114][T25027] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81400a56d4 [ 3355.827065][T25027] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000003 [ 3355.835025][T25027] Modules linked in: [ 3355.838908][T25027] CR2: fffff91fffefffe0 [ 3355.843047][T25027] ---[ end trace 5f283b91c1cfc807 ]--- [ 3355.848489][T25027] RIP: 0010:memcpy_erms+0x6/0x10 [ 3355.853409][T25027] Code: cc cc cc cc eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe [ 3355.872990][T25027] RSP: 0018:ffffc900015f7990 EFLAGS: 00010082 [ 3355.879033][T25027] RAX: ffffc900015f799c RBX: fffff91fffefffe0 RCX: 0000000000000010 [ 3355.886982][T25027] RDX: 0000000000000010 RSI: fffff91fffefffe0 RDI: ffffc900015f799c [ 3355.894932][T25027] RBP: ffffc900015f79f0 R08: ffff8880a74dc1c0 R09: fffff520002bef38 [ 3355.902882][T25027] R10: fffff520002bef37 R11: ffffc900015f79be R12: fffff91ffff00000 [ 3355.910838][T25027] R13: 0000200000000000 R14: 00000000fffffffe R15: ffff88821fffd100 [ 3355.918801][T25027] FS: 00007f81400a5700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 3355.927707][T25027] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3355.934265][T25027] CR2: fffff91fffefffe0 CR3: 00000000a9ac9000 CR4: 00000000001406f0 [ 3355.942217][T25027] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3355.950168][T25027] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 3355.958119][T25027] Kernel panic - not syncing: Fatal exception [ 3355.965838][T25027] Kernel Offset: disabled [ 3355.970161][T25027] Rebooting in 86400 seconds..