96a18e7c52dd87d74084476ca22e919db6d8cb6775d14bff026f97cd460774d8afb30b299cbc6af2f4ce6424fa9fceddd69eb627bbfbc1d78099910ad11d40caca431f9eb9f81488f7c2b22711ad73d564322639a1df3c4fee3c24ae7ddf7feadc810b4197463b40bde00653c6799f7e61360eaaaa4f334ffed114af4d204b411024bb0631e7a0b14cf16db09cf1e7117a6d0e1341695529bf4ebf8c0ea274178fda5736433a832daa16df", 0xd6}, {&(0x7f0000000840)="a0141eb68786dd66b1f00dfdf793931cf43b58bf89d693ccdd26a099a0101fbec2b9f5ef5ccb7ccc1d", 0x29}, {&(0x7f0000000880)="66702ea393ec596d24c5a157ffef4d12a317b68f6958c78be30820b5f5684859910e70ec20add52d333d75", 0x2b}, {&(0x7f00000008c0)="0c53aae23d499bfe122d48d9728f9ef8592942f83652578c4efa61dce66874ba2890fb874b43fb2311be8daf685fca0d5af8e493f0dafce9065193514ad4d571613197a29005cd85fcc4e314a1c6c52ea5788ef9", 0x54}], 0x4, &(0x7f0000000980)=[{0x30, 0x112, 0x1, "dd3c77623752f889b1ec72786fb570aa87f442541cd6cf4ed783f8074533"}, {0x20, 0x0, 0x8, "b8dfda7a5cf2926c4f62b083"}], 0x50}, 0x20004040) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) [ 2613.548106][T17262] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 2613.582813][T17262] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.3'. 20:57:19 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x600300}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:19 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:19 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000002ec0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8914, &(0x7f0000002f00)) 20:57:19 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x8005a0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:19 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000002ec0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x2, &(0x7f0000002f00)) [ 2614.553276][T17265] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2614.588855][T17265] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:19 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2615.179312][T17278] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2615.191049][T17278] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2615.401806][T17308] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 2615.420214][T17308] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2615.610222][T17274] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2615.632692][T17274] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2615.865473][T17319] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 20:57:21 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c6394120424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:21 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xe0ffff}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:21 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = gettid() sendmsg$unix(r0, &(0x7f0000000280)={&(0x7f0000000040)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00}}}, @rights={{0x18, 0x1, 0x1, [r0]}}], 0x38}, 0x0) 20:57:21 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:21 executing program 3: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000500)=ANY=[@ANYBLOB="85100000feffffffcd2bfffffeffffff18100000da1fb004a91cb27b4056b2b0f9516e19", @ANYRES32, @ANYBLOB="0000000000000000181b0000", @ANYRES32, @ANYBLOB="0000000000000000183100000100000000000000000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000140)='rpcgss_seqno\x00', r1}, 0x10) r3 = perf_event_open(&(0x7f0000000b80)={0x7, 0x80, 0x1f, 0xb, 0x5, 0x9e, 0x0, 0x5, 0x400, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xd8d4, 0x2, @perf_config_ext={0xfff, 0x36b}, 0xa0c0, 0x4, 0x96, 0x9, 0x9fde, 0x7, 0x0, 0x0, 0x9, 0x0, 0x61173524}, 0xffffffffffffffff, 0x7, r2, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x10000000000001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:21 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000840)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b0379aaa73e4bf3c7679a6c198eddce9e4f8045df3e38d80797985be3fa23a245979a201c803a045ee23f28ad9e0d5628b2be00000000000000"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000000800)={&(0x7f0000000740)=@in6={0xa, 0x4e23, 0x3, @private0, 0x7}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000001900)=[{0x1010, 0x3a, 0x1, "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"}, {0xb8, 0x10a, 0x9, "7d1d8960592c29fbbe70b39ea8a2d1e54b8b7ffae3847d23e230b512b8dc190ed4373476961b115b082c46ffa435eba6170f4ec135ed3c84fc47c70aa91862457c286487d0ba89122883e1b28a9bb0d8804caed73a73c97d9eeb85b06f6457da4d3ec169b07682998c0e02345471ffea9fe13d19a029f72e5af80c5378d2df0d3242b6fc4a985bec3d44858c779fdab6b9fa88ab89b5257f53c09c6914f742e93373"}, {0x68, 0x10a, 0x40, "64f488b53d5d5d75cb07f451d38a62f69a80d338bd0396a9f1e159cfae0349a46343384b9fe306ae602c4761b23d4930218f479ada344ff901bc82905cbcc36a0849f4fadfd3811168e4a99121a35996877975a8ae"}, {0xe8, 0x104, 0x8, "7a4532c57383eff3ce9dc79cb2a6d0e0ade2bfbee3248406f5e1a4483e47b9e1d3addef3c28d034f8ad8f0eef45873e6b03692553a5221a9d2dc6abc9527f6725427d4c2a98f810e4eda6a0d1cf075367df2efda8349f7279503042720d9692daaf8c93a4a45f9084deac3b4f19e2e1d1bcc0ef6b71904f70eeed622c13b98d08f72a4fc63040d517855acc5983276be2f3b92079f3dde5a0dfe0192f8cd079d3d1f0f0f00d531cfc043c5cb69472c7dcfb4dff5f5dd02abf7455bc477a5bbc187e5f66e4229be038be403042088ae6ace4251e92930f3"}, {0x80, 0x112, 0x7f, "5e7d1b70eb638bc732cbdff51828d6b25209d53cf82f927ad028b57f822b361753c54319f791f26b4e9ada6f5bdfee2483dba27a0c87eebd0cd0e38a93bd29f92aab625cba81ae5bc7f8db63b3aec55dd187ee47f31a0719da12fe6b998c185ee930b15082f3ef93ddc77a2a7889f7"}, {0xf0, 0x104, 0x9, "c0bb991708633d7b597e2d7ba4b9e634dc33924546b8cc016ec0dc1519a8f2effaf1436309c2e31d44794ff23493ea1ee9cbe4b133d4eecc61ebd4c7db8a7d2fa64abc126f08bbdfb6777752248a9dec18a93d6cf5176c4dd06a86a75159cfd3cd9d9c9e7cba54c0330e7e2ba3269f54d1cb1e8ea0951739253f74575f77224789acff4d4585fb4c71d5b9a924630f10a6d0a112cd6c2ae3ad6bc1e9e979b21e55af724b7c1c5e678f6633b2c43786cca3b317751dab094f10c8dac2e9734b3bfc9d2414bf22277023bea9286db3351ebf0e2dbab54d719405df"}, {0x10, 0x112, 0xfffffff9}], 0x1398}, 0x4044050) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=ANY=[@ANYBLOB='\x00'/16], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8d6, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) [ 2616.232826][T17407] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2616.324639][T17407] netlink: 'syz-executor.1': attribute type 9 has an invalid length. 20:57:21 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2616.395985][T17408] netlink: 'syz-executor.3': attribute type 11 has an invalid length. 20:57:21 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xf0ffff}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:22 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:22 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) 20:57:22 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000003b80)={0x0, 0x0, &(0x7f00000039c0)=[{&(0x7f0000002540)=""/4096, 0x1000}], 0x1}, 0x0) close(r0) sendmsg$inet(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)='v', 0x1}], 0x1}, 0x0) 20:57:22 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x1000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) [ 2617.549784][T17412] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2617.567506][T17412] __nla_validate_parse: 3 callbacks suppressed [ 2617.567525][T17412] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2617.829662][T17413] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2617.842224][T17413] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2618.026689][T17407] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2618.039980][T17407] netlink: 'syz-executor.1': attribute type 9 has an invalid length. [ 2618.049595][T17407] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2618.061243][T17443] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 2618.071718][T17443] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2618.275308][T17452] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2618.293607][T17452] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. 20:57:23 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c6394280424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:23 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:23 executing program 4: r0 = perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 20:57:23 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x2000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:23 executing program 3: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) socket$kcm(0x29, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103, 0x3}, 0x80, 0x0, 0x31, 0x0, 0x0, 0x1a0}, 0x4008c80) [ 2618.550626][T17453] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:24 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000006c0)) 20:57:24 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x3000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) [ 2619.233207][T17532] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.3'. 20:57:24 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:24 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a1017a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b00"/172, 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:24 executing program 4: bpf$PROG_LOAD(0x2, 0x0, 0x0) 20:57:24 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x4000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:24 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2620.064833][T17539] nla_validate_range_unsigned: 2 callbacks suppressed [ 2620.064855][T17539] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2620.098453][T17539] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2620.370662][T17537] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 2620.382008][T17537] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2620.598312][T17576] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2620.611190][T17576] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. 20:57:26 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c6394330424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:26 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000012c0)) 20:57:26 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x5000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) [ 2620.899150][T17573] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 20:57:26 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:26 executing program 3: r0 = socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r1 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000feffffffcd2bffff0000000018100000", @ANYRES32, @ANYBLOB="0000007cf266009b341d8733e0856e", @ANYRES32, @ANYBLOB="0000000000000000183100000100000000000000000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) sendmsg$kcm(r0, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000dc0)="b7d482c13df971bb94c728c55165067ce25c452cd649ffefd0fb54e78c051f3e587a28847a89e600c1b5399a866abd4a8083f685940472f70d52877e38ad59e9f077846ebac0814600475e64dcb23f226f92fa2d201e5e6c60e0fd342f62f3fc81bb79bb4ca084cef64e45615c69bd85ce9904582063ced17151", 0x7a}], 0x1}, 0x20000050) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xe43) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000d00)={&(0x7f0000000cc0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x1d, 0xf, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, [@map_val={0x18, 0x1, 0x2, 0x0, r2}, @generic={0x0, 0xf, 0x2, 0x7fff, 0x982b}, @call={0x85, 0x0, 0x0, 0x51}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @call={0x85, 0x0, 0x0, 0x8}, @jmp={0x5, 0x0, 0x0, 0x8, 0xa, 0x100, 0xfffffffffffffffc}, @ldst={0x3, 0x3, 0x6, 0xa, 0x4, 0x0, 0x8}, @generic={0xd0, 0x0, 0x4, 0x5f, 0x7fffffff}, @jmp={0x5, 0x1, 0x8, 0x9, 0x8, 0x4, 0x10}, @map={0x18, 0x5, 0x1, 0x0, r3}]}, &(0x7f0000000b00)='GPL\x00', 0x200, 0xd2, &(0x7f0000000b40)=""/210, 0x40f00, 0xa, '\x00', 0x0, 0x23, r2, 0x8, &(0x7f0000000c40)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000c80)={0x3, 0xc, 0x80000001, 0x6}, 0x10, 0x0, r4}, 0x78) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000140)={r3}) recvmsg$kcm(r5, &(0x7f0000000ac0)={&(0x7f0000000500)=@sco={0x1f, @fixed}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000740)=""/245, 0xf5}, {&(0x7f0000000580)=""/21, 0x15}, {&(0x7f0000000840)=""/172, 0xac}, {&(0x7f0000000900)=""/157, 0x9d}, {&(0x7f00000005c0)=""/40, 0x28}, {&(0x7f0000001900)=""/4096, 0x1000}], 0x6, &(0x7f0000000a40)=""/116, 0x74}, 0x100) 20:57:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0xe}, 0x40) 20:57:26 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x6000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x9}, 0x40) [ 2621.521095][T17578] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 20:57:27 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000800)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000840)=ANY=[@ANYBLOB="85100000fe84a6070000ff0000000000000000003882393859524ab1c116eafc4dbd6dcab63093e23f98bcf04884a5080cb82f0b255970f4f2cc83fb9906d0b810fa00df49c32b50f5337ed666296e08e5aae5b308640bf9", @ANYRES32, @ANYBLOB="0000000000000000181b0000", @ANYRES32, @ANYBLOB="0000000000000000183100000100000000000000000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000740), 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000780)='{^,}&\x00') ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:27 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x5}, 0x40) 20:57:27 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x7000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) [ 2621.924445][T17646] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 2622.538196][T17646] ieee80211 phy2701: Failed to add default virtual iface [ 2622.559166][T17649] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2622.759790][T17687] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 2622.771797][T17687] __nla_validate_parse: 4 callbacks suppressed [ 2622.771816][T17687] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2622.979633][T17690] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2622.995746][T17690] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. 20:57:28 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c6394350424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000000ac40)={0x0, 0xa, 0x0, &(0x7f000000aa80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:57:28 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x8000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:28 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 2623.267316][T17715] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2623.278420][T17715] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:28 executing program 3: socketpair(0xa, 0x0, 0x1000, &(0x7f0000000040)) 20:57:28 executing program 4: socketpair(0x26, 0x0, 0x0, &(0x7f0000004e00)) 20:57:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x41) [ 2624.049728][T17741] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2624.326412][T17771] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. 20:57:29 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000240), 0x8) 20:57:29 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x9000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:29 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/182, 0x38, 0xb6, 0x1}, 0x20) [ 2624.955019][T17776] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. 20:57:30 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63945b0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:30 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x4b}}, 0x1, 0x0, 0x2, 0x1}}, 0xffffffffffffff7d, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000a40)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11bb5c94578e959b25cadca02af1551f8769c90a11d6a2f4d9aef60517bb7c8bb83a729fc82293b90efd7a63960579c3b446ce052be", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xe, 0x5, &(0x7f0000000640)=@raw=[@call={0x85, 0x0, 0x0, 0x60}, @ldst={0x1, 0x0, 0x0, 0x6, 0x6, 0x20, 0x4}, @ldst={0x1, 0x0, 0x5, 0xa, 0x9, 0xffffffffffffffff, 0x4}, @exit, @alu={0x4, 0x1, 0x6, 0x9, 0x1, 0x10, 0x8}], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x15, '\x00', 0x0, 0x6d0f733db410c9d3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xd, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, @alu={0x6, 0x1, 0x1, 0x2, 0x6, 0xc, 0x1}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @exit, @jmp={0x5, 0x0, 0x4, 0x0, 0x5, 0x0, 0x10}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x800}, @ldst={0x3, 0x0, 0x1, 0x9, 0x2, 0xfffffffffffffffc, 0x4}]}, &(0x7f00000007c0)='GPL\x00', 0x8, 0x0, &(0x7f0000000800), 0x40f00, 0x0, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0x8, 0x6, 0x9e}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0x3}]}}, &(0x7f0000000140)=""/182, 0x26, 0xb6, 0x1}, 0x20) 20:57:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x17, 0x0, 0x1ff, 0xfffffffe}, 0xa4) 20:57:30 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xe000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:30 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000140)=""/182, 0x2e, 0xb6, 0x1}, 0x20) 20:57:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xc}, {0x3}, {0xe, 0x5}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/182, 0x40, 0xb6, 0x1}, 0x20) [ 2625.434901][T17864] nla_validate_range_unsigned: 3 callbacks suppressed [ 2625.434957][T17864] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2625.562447][T17864] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. 20:57:30 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xf000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:30 executing program 3: socketpair(0x1, 0x0, 0x0, &(0x7f0000000080)) 20:57:30 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/time_for_children\x00') 20:57:31 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2626.600737][T17865] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2626.619413][T17865] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2626.794939][T17871] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2626.805028][T17871] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2626.996564][T17902] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2627.005011][T17902] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. 20:57:32 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x5}, 0x40) 20:57:32 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000001c0)) 20:57:32 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x1f000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:32 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:32 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63946c0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:32 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000001900)=""/4096, 0x1000}, {&(0x7f0000000a40)=""/87, 0x57}, {&(0x7f0000002900)=""/4096, 0x1000}], 0x3, &(0x7f0000000b00)=""/58, 0x3a}, 0x40000020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000740)="2b86f7b81e4795548918f5db810f0100fd8e78be5b3afc5ee3403e6b3994ce12578e036a2e56ad86e244404b86fe88b600d93dc7747b7d4a9f743e529587bf5c4f1b1ebb8c7727d5c8481bad09e61454794ddd67ea71d86742bb7199361295efba9bf02a8643839b98226985a71146647aa54e27fd3dcd73240557ef9f81107b39ea33f8ac9416", 0x87}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}, {&(0x7f0000000800)="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", 0xfd}, {&(0x7f0000000900)="e83d51d6ef609f2a1d6a006bb7e680161c161b0b3ef6256470b16338de781986c39a687b983e9f32e6aeeffb128ec2b3d451dafe4d16d4416ceb6de37bda5e7322665ebdae032b27b583e6b3a0832698bf3d7ebf6c521de6fe622a00e46d9c5858f7affd7cc3252eac4c9f93abdf80e33a3a6d5c7e3ef773b85086c858aa07c61f199fbf49e55526adaaef6bc36d", 0x8e}], 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x5, &(0x7f0000000c00)=@raw=[@btf_id={0x18, 0x1, 0x3, 0x0, 0x5}, @alu={0x7, 0x1, 0x5, 0x8, 0xc, 0x0, 0xfffffffffffffff0}, @map={0x18, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x1}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) [ 2627.349638][T17952] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 20:57:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@enum={0xa}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000140)=""/182, 0x2f, 0xb6, 0x1}, 0x20) [ 2627.397290][T17952] netlink: 'syz-executor.1': attribute type 9 has an invalid length. [ 2627.476026][T17958] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 20:57:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1b, 0x1}]}}, &(0x7f0000000240)=""/184, 0x2a, 0xb8, 0x1}, 0x20) 20:57:33 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x20000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) 20:57:33 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:33 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0x3, &(0x7f0000000ac0)=@framed, &(0x7f0000000b00)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:57:33 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0x5, &(0x7f0000000ac0)=@framed={{}, [@call, @call]}, &(0x7f0000000b00)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:57:33 executing program 3: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 20:57:33 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x3d0f0000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:33 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, 0x0, 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2628.592689][T17961] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2628.614061][T17961] __nla_validate_parse: 2 callbacks suppressed [ 2628.614081][T17961] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2629.104430][T17952] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2629.119779][T17952] netlink: 'syz-executor.1': attribute type 9 has an invalid length. [ 2629.132860][T17952] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2629.150795][T18003] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2629.175017][T18003] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2629.350189][T18004] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2629.362233][T18004] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. 20:57:34 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0224fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:34 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0x4, &(0x7f0000000ac0)=@framed={{}, [@exit]}, &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c80), 0x10}, 0x78) 20:57:34 executing program 3: socketpair(0x0, 0xa832d0d023dc800a, 0x0, 0x0) 20:57:34 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x3f000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:34 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, 0x0, 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:34 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @remote}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000800)="334d93fc7c3abd5219a127356cfa56c8cc2009932e110123bb3474ddf5e64e5dd675a8cd5720925fb2fce595a0b9b1897b1a0d337cbce1dc52638efb9f2e4d5ee0b4d31df43cf09e0a0d2f944c614f544adb20362e1e2009552f250828d4744a6e603a5ae1b6512c", 0x68}, {&(0x7f0000000500)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000740)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d256b06580db6af3d4e3abd8b06071da11b", 0xb0}], 0x5, &(0x7f0000000540)=ANY=[@ANYRESDEC=r1], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000580), 0x4) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:34 executing program 4: socketpair(0x23, 0x0, 0x0, &(0x7f0000000040)) [ 2629.721600][T18071] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2629.753799][T18071] netlink: 'syz-executor.1': attribute type 9 has an invalid length. 20:57:35 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000f80)=@bpf_lsm={0x16, 0x1, &(0x7f0000000e00)=@raw=[@func], &(0x7f0000000e80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2629.853111][T18071] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2629.970126][T18075] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2630.007416][T18075] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:35 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x40000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:35 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, 0x0, 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:35 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000001780)) 20:57:35 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000f80)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000e80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2630.770770][T18077] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2630.783917][T18077] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2630.826958][T18071] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2630.841456][T18071] netlink: 'syz-executor.1': attribute type 9 has an invalid length. [ 2630.867289][T18071] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2630.880076][T18112] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2630.896763][T18112] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2630.921385][T18113] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2630.929678][T18113] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:36 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0324fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:36 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x48000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:36 executing program 3: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:57:36 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0x5, &(0x7f0000000ac0)=@framed={{}, [@call, @call]}, &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:57:36 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2631.583511][T18142] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 20:57:36 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @broadcast}, 0x1, 0x0, 0x2, 0x4}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcc, &(0x7f0000000740)=""/204, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:36 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000f80)=@bpf_lsm={0xf, 0x1, &(0x7f0000000e00)=@raw=[@func], &(0x7f0000000e80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:57:36 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:36 executing program 4: perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:57:36 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x4c000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) [ 2631.661987][T18146] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 20:57:36 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0524fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:37 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000240)='syzkaller\x00', 0x6, 0xf6, &(0x7f0000000280)=""/246, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2631.977079][T18172] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 20:57:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:57:37 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x60000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:37 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:37 executing program 3: socketpair(0x1e, 0x0, 0x0, &(0x7f0000001340)) 20:57:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2632.883870][T18180] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2632.914733][T18176] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 20:57:38 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=ANY=[@ANYBLOB="bd2bffff2200000018100000", @ANYRES32, @ANYBLOB="0000000000000000181b0000", @ANYRES32, @ANYBLOB="0000000000000000183100000100000000000000000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = perf_event_open(0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000780)={0x4, 0x80, 0x3, 0x81, 0x7, 0x8, 0x0, 0x401, 0x10000, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000740), 0xc}, 0x10000, 0x4, 0x3, 0x0, 0x6, 0x6, 0x207, 0x0, 0x401, 0x0, 0x6}, 0x0, 0x2, r3, 0x9) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:38 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x2000000}, 0x40) 20:57:38 executing program 3: perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:57:38 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x65180000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:38 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2633.245057][T18186] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 20:57:38 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0624fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:38 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f0000000000)=@raw=[@initr0, @exit], &(0x7f0000000080)='syzkaller\x00', 0x4, 0xca, &(0x7f00000000c0)=""/202, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2633.507926][T18246] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 20:57:38 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x68000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:39 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x6, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000008000000000000000000000004750c00ffffffff95"], &(0x7f0000000080)='syzkaller\x00', 0x4, 0xff, &(0x7f00000003c0)=""/255, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:57:39 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:39 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x6c000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:39 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, 0x0, 0x5}, 0x40) [ 2634.735461][T18253] __nla_validate_parse: 7 callbacks suppressed [ 2634.735483][T18253] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2634.781255][T18252] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2635.239621][T18281] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. 20:57:40 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f00000008c0)="9c465c366cbae1d3d40e7ce475c3bcabfd92752f7028dad5214ab808a098b816f41e8d04f6015c9d1040d0d3e184422b7fe3f77d6439a26c59b9a2d7689afbf55941b2bb056b96c86e8e12837d0165143b48f2", 0x53}, {&(0x7f0000000940)="4e1c8b3a19d62bf7119a20583359527174cc85084166bbc18681391f1f1807e39d1e366ea0cef4aed8d91fac286aa2e68435b8a009ae3b5a555316da49275b0d945c650f2ed54c6590a37ce937e5f108206faf0b82f4f3fcfa1afb38cb4745b3e1842f4cda2de1204c28eba2f6940845563046a449104be6ae5da2c1ce3efce28ddb86593f8018c554e8786720294715a0b98f2f068df2a8536300f7e5a2687c323c481f0657aafe75b4447af4d48c4390a44ed156f989a3cbf43d997184f811a4e926511c027b425456565224acbb4ee11e16b3ef40e5e005479004826c16e9d99ea61a3cac09a8e83a1864aa341fd3a20bb30de1c1894e", 0xf8}], 0x2, &(0x7f0000001900)=[{0x100, 0x29, 0x8000, "b98fdb35a354ae7da240617b3e4dd4db2241c0ee900b9936e21f4810583f8ea8239cfe5b42d70b7ca8e7bf95d85801dcfcf393ef4414f734a0b3577ea8a87e29710912f1eb140c8d98e0a3a584234ced84ddee5b8424d12a59b200b0651da5b8c12b7d25f6810d3234856d9e6fdb606c73f9fa99098d5ca088ea78a6fdf0bb2534eb89cf5b4a62e75be49010ad554ba778a0da667bd15dace08b6a257f37831d707422cc362cfa6c6e35dc837047bc02a1453fe4d6251221a4488acc67814dd96b76a5f106802d9c77bc5f7928cfab92fc1f7a5fed15eeda5f0895f8074449de3ecd5a11d166da2fd3d79eefd7004c"}, {0x30, 0x135, 0x6, "81a299f5f43e65c69438d7d577a87815ab658d6dabd3c4d758"}, {0x48, 0x10a, 0x1, "de7c95019b92802f89e12c2013eb4e1be152c03b441e14407938b0c19bd7f14dd4a1001a63cb6821e6902b267f8f85445ae3657905dc"}, {0x110, 0x110, 0x5, "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"}, {0x40, 0x116, 0x2, "ab2b93367285bf0e8e5228135961e83790477f74fb033e9ea7744f8c31d890e894343f1acc02d83c5ebcb9a8cff67c3b"}, {0x1010, 0x11, 0xe4528, "a1e86f8b1c19cd00a0934c2decab95af67dca6b0a633bb91d405bf0a9cd74a633a6e380cb641ef7c8c1fd29d011f109974b1222cd8f4b963ef0e04506010c14b13b3ddc33d8fe63e17fc81b2a767546e047ef0e13d8c3d939005b2324c90736ec5716b37462d4cf94399f46d48e38b67e7b49415ae33c9f787f89d0c20dae461a9f48032ee1b4e6e9559e5526a9ccceb9ba13c177ec21220fe4a124c0a72cc8aa9952db8679d2d7963a22413bab2337b7d92337347b83d68da8d61f8c5459cd866ba73693a94a7ea64f21800c9abbb9e8a2353c3a6d9917118bc6893604a1f20f167b094aa4519092044f5dbf2bd50addd5fd61c74381862cc76e7ae652263e95c52f12bedf4bcfc1c2913cf6f458c6f067f5fb12b4250d5f26c6bb46d301132f477659881f9ef97cf12d5ce50e9f0f225ae9e7b3174e4072c384be819892174b2f75892a88f3d59a273b0b5897b2d86ea747544908dca5ce58c2702ca31d8af0782f09e2f30f267f22f2d8f8216c2544a319fc3af1cbc7b0fbb6629f511fbf2272c31a43e017582b030e00df30572c7e1c05184ad07b3126d2a90d7840c6a1ee2107093798ee1d0152df55d80956118e4bf3811799379461ff87f91f8309266e2f6c8abdec518655a54b01c62c7017b6abe498622b122bc85d91ee772a475f6ff73cf3f38d700dc37a6f1318e86b19fac7947bf7ad40e67651a7e05747947a47b8a125782069bfd4aae91c8bdd0de4b98ee350d702b256727af5f85542f531bc12e93b813147ae01d72e067b7abcfb8a64403967011e284cc0f2da1d128254faede566e72adaf30c85b0ee808a8020eecd80897e2c7ec0c1d2de3d644b1f2cf6e5900915d5d8e6bef32b914ad5fe1408cae3297d2ebc1c66cb13ac966cc7afcc3823d55059f98489be159684905aa70a44a580a98f7646590b581401eb551857abf838e139446cb0fefdc383fd97b6e9cd3f1ad20b72272d5c86042eef404278950f77e3ec68cbde01465c8758398791b760b76dea8bda05df760d1f74728aa70eaf037a17020b8156a2c88833f9011973b8a4e014bf8fe2649f3fca45b115a35d931ae5ca84d720a892e39b7a8f5c437affe590fbf6f768baca6570d5aa844060b5870a11815895940b0293110cddd3f15f23991a585939c850540b2d7ccc02057d8aedc8a1b02c9c2eb1f5f21d602ae85fbcaa68b0f7ba6b009740b6b925f60de04f68c9fc4093530fc531bd020f84ecd0a2bd4ae3380d75be62645bf91d5b8f146b390c28391d9417f8ab357be9faa61fd6ec9eaa7c481e7ca73f16a7a5d68fcdd019ad55106d8406b0bbc4b3b3cf9ef03141bdef02b5736f1a76a188882f08c7120de121e14a10357e258b0494e582813a79bfa419b79473d5ada7176c0a54c1a4a78542a6ed03e0454d7690e0a6ac16e9d3f54838de2a642b095ed5d732108cf04dde31b0e2c1ca673910673f51a6debab41d6ee6c6a891b276a4a0ed7bb005adc1f2825c9cb3cc9081e0fd612024f917a21c4d49b63782723cea706cd500e542a119281bd398eb693c76376793967165282ebf2801d47c86098a6c6518dc1dc7dd14289592a3878c744eab72a4d96eb7522b207ebb895b551836febe227e1861e3f4f8e50f2b8c39ed114783819bb88b7c572464fa106e351b3d8a76c7e01d0701b791a70208fd0d21cf37866367194c0c986e16e34bc16afbcae1baa95f9816072aa49e05e104b9f064b5815312323440ba0d98bc5dbcdbeaed3ad0cd1967e19463343dd7dd3af866085e11a0afe57b241dcbaba23527e230a29ef88c9ee4f8231851f927dbfde8289105cfa4612b6f0bbff55f1d68c5e9568952dfd4512ec2971cd93ce80d05290aa02c32a4dc7773984dcc882c02c0dc04f47ba46fdf38732ea427de9068f00ab625fb89e09db5d56760a90a8062d8b5befd8bdac526b1573facf5dfc0a4b8180088d6bfd018b1bec3c40b91406d08f8622ed2fbd36a5068d8d383b612b69bfe761504c2bf71a1b17c3c5e22bd6f8f975759ed4988ff26a6541e0750f118d26437289da56f279cc76fb2af5c1202903dc3eae52d9443b67205f8d8f179f3010327fdda76a77a025560ea52a203c4536905e9821100777d7b4068e32b2cc456580156c72586ecf044803edf8c4c44847a0f1dae34a16e7fff18793e393fb8f5d3a6f4565e978cc026b6022b176c86e66489a12934d86b8339503d914f7f52d6eb745b1e4862659b98724b3690d16be2b2c0121c268776711ef8eaf4b99c0c580e5295d5125086b90c7876ed05f90493f9599c0d2daa7d8df3a399118bdc4ada01c6163cdd81a3d165749e93cc8852672ebca176526fe5c673a14610a8450cfd9ae95f800320dc820285261d49fd9538c8d8e681e9d3a4c452da944831cba8d8bc0d8ec170e00a644ec5133619257d9edbfea39db6717cef69eb984841ff999f148c6f5d9a06f30b08ad2677948ac558193a16bbfce4cfdbe65a59df61dd8ffe308a4d6d13bcc8f2e9c274dded4b9b0961858bdd9f0593e3f1fc11e5d1854951a6394694119bbaba7c97769011750123e1ae98aeffae3fa2d7515a9031086140e6d94f327c470aafd3f35dc64dad2c2eb1d8af2bdb51ca57200bb6890e7e0c5448bb2e33bcd66ce1a52cc496a6feb3fe88a0e19e61a1358eec24da6004d1f6fcbc9a6f5ba19ed5dc99a3a8f83ee49224208b28f6013ea07678725ddb8bd98d8b71ded8d41b2ee7596ec17dde4cab05e9028f64f3ffd2594fb0b6acf4bda2edafeefec4606277997a2bb383aed894945e87b9896996a7916193fbcae2f6cded859f54d5536dcf332bb33de72998af0891f1435f5b20f4676be3ec20ec8a4b26b3ce3e4ee96b7e86715822b87c9cc15d17559a6796f612d37f5707d9d5def61dff409a23313cc6a26b53a4ab7df7e4258715812e743855523cb07570781a0486045bef790f4679a08503c1a40ca3f55bda46c06b6042e3b475f03ce688f311f38430189fc4a2c8520ed76edb32c552f28663566952d52b466bfa2e6afdc65fe487a57d073025fe716c34ee5ff1dc9bc85b866dc394241d220f2cc744e86791cb8d988ba9715876ca48e8c3a8eeace7bc304b93eb0f6b81aff65259b6276a5903143ba8647744769b65c82793a2fdc236e7097afbf21ad0058d1db4c50f7b136ea6249de666fb3a8906d6228f876b59251c3230db27c35385b6ccf95e9f7ea5aca37b50c3627bfd7669e10a096ada2f83ef9ca4b028cd1032d95bfc7aea3835aa1924e46be886f07722346a4df2fb4c94e9ede427d9b2a9b61c46ebfcfd7d91734a0374eeb88b3b605ad9e6ed0502ef5c9f4e629b65f4065596ef6da115da23f39c64943d7f1d1be6ae48750ac3c48e2b6519cbf63eda46bc440af944bcc80ea4a8bfb9fa7afe9fd5c30370be7c72d773c6363e1c06ee559148bd9f8e80fa4ddcaf24c5a04fdb2eccf5f27a9d828593c08d5647a784d312cdea44af4cb76cb94c04fb69c7a7d5d863451316e05d161e578bc51d36d62889f5778a92979884e4bef37168c6ad90e0bc9f30c6bd03f41d479f315d83f7959ba0f179240e1b50e8d496eb1b14e646baacf4784ad7ab3a848eaf32e054b334c54d37209e0eb71db7df62de61152290568a5e9cef9b437edc9421c2ae5df28028621b1dff5d34b0e8c2244eb34795a8e5c5694a3e1585ac8623748d62d00fbce29744470ac3775029931add9d5c06e48a87adb997ea3de7374b4926cc2b2381f08b4db6224ad9c9d28d6c0f3cfd23058ca21ff8b6674ca0ed95ba39de3e32c040dc963873f8c880f8ebcfa5af3d62808eeaa50a61ac22764618137f9025f3239fa4cd22d90380a48917f0a5f61c5a4d252195592fd2020a6f3faf5b54bcacc32c345d638e04b6bcfaa5fd08dc5d5cc4a9f63a65da8464244d403561450cfacab2ffd96675af14a5cf9ae01adaceec6e6fd499c51212aaf31d29202ad62a7067f6a0ff4e3e6231f44da8ca4797679939d02b055eb4410c8954aed8edda532002a5d3a81351ef1656ed72b8cfa915493d092f384dad86c89dd5f5046519eb1ae93e9c9262a8cd842b4929aec540c54c0d335c884e4075ad96d4193fcf8db619171763e3aa247222738150603d82a4b2240912cfb7f42546265ecc7b402716afccbb98f90be5a3e4de1427993f1896b96e30abb67d1578fbb7ed982a3241153168d625ca12ab77864679d27cb7ad0f430f1a3dfd323d9cc80ecffe31bc9c34e6a109793c8e9dec9a10af07ef5955cfbb4ca8ef47de21fa878e30c0dc2b24e33ba265e2a3c9e45b7ea1f0fc750b1184d82997a8e253f40834a8664cf127c25fa20f2c4a194901d97f543f121499f27df048db3bc4162e9b88505bc96de77e7d80232f57b597e65cc5e138582041a487f410bf35146ec065e3239e7ca41643a0aad4edfa986c4bc8e7b1727cd02f79f021c5962314dd3a440808b9f85c8f2a040a115a6a8d165d0783656646f790d4a0567fa175f0c34577f0ff07a3131e8b8524da861430cf1528d62ef8830b3e87ccbf859214e327117b406b0198a4fc0f2843ac0574e2b1408cc9255b0865c79e47f9bbf083df51fce96ebd91b30948e2d091339a67e42f8d17569a9c2bfd6ea9bf3a73531961e2f5da8d87a66941cd87989ffc193f17bbc6fa8b7069f0668b688763ca8d1afd156606d1c4ca147c053104b877de54dbcb5774bccdc056f2e7342cacc720c1a3491b13d3de93ee6d69569f411c8d389f422ae54882f648d24a34db422a1959bd802c5a7113317dc9654eaf52a700989b8a1dd50bb2ce8e977ee5300f0ab987bfba7ef6bbf4da9297b649fa6818669561434f6c4845b1744ff3f6b33dda3c5fb931575980e8044f24d1f3f4b30c53498952b25bceee61c062cc23c4b23df9be51ee45ddc6bc23fcf82519a2a5ee2234778bf4a5a69984b06df5c15b3576f89dc32336ee239d4e8ac7f38db76f111fd42e03d41f5ce00e01e09bfd94f49a565a1fe844c33db567077c2485598be60c4c155786dab8a1bf4fa85a6440f6c097cfac3d24b2a279089432b7a0a9f039e0472da89cfc5d4ba746dc19048403d2a5cb9709682f837cbbf2139f1c2acda6306d503125b53482e68347c33901ebea0bc506c14ca2637943d273f72d708da81ccd2391ebaafc720fa688daea26c8ea4fe2ec8f92528d61ffbfa659de873f3b54d2c0c183fe5afb06ff2c8a244a3343542aab9fded7bc941f1f6bce6176e66d21e1f7af9e1d4ab9302480d969e815623167b859c8a58f6d6b15d6b66cdea9a028922aada72d8f3929042c62253b683c013701a1cffcbe5081e13f8809cb6c8fe185a4102aca5389d4362baca3e42700871097637bd50e648321107c21226f8aae871925112af23638623603e134ef1dfaef7326c2d735ba3a544ba782a7ed0c358a80fcb9fde7fd717e5bd10f9a55e0cdcfa91a81fba9ef0eb08fbef9a5b79e3a99fb1420beca1fa8b960cd4e469e10bfa240461ba34ceafc2840cf5bc8fdf5191370cdbbc822dd79ba5dec8e813b0ac319d299a8bd6fc6967bbbc9dfa29e973f1bae44044f104dc8f2a6da767b5e5ffcf81bebd567dceed9745873297566c07bf36cc675275ab2ece1699099b3a0ffc6df7213fa1f307c36f999df78bc8f15fadcf1c63ec4585debf294bbe67be95327e84c9994631269cbb0ba666c9d53ced1727a511e18426fd4c1d5264b37a598df9ac70b79aba267d909181fa156e07a5a106359cf4ac37034f5fd4430d350594900656ef2d7d7163320874fa68723014"}], 0x12d8}, 0x804) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) recvmsg$kcm(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000740)=""/1, 0x1}], 0x1, &(0x7f00000007c0)=""/129, 0x81}, 0x9f345226571bdb80) sendmsg(0xffffffffffffffff, 0x0, 0x4060004) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000d80)={0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000ac0)=""/59, 0x3b}, {&(0x7f0000000b00)=""/107, 0x6b}, {&(0x7f0000000b80)=""/21, 0x15}, {&(0x7f0000000bc0)=""/8, 0x8}, {&(0x7f0000000c00)=""/120, 0x78}, {&(0x7f0000000c80)=""/72, 0x48}], 0x6}, 0x2060) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:40 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000880)='ns/time\x00') 20:57:40 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:40 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x74000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:40 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x139f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:57:40 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0724fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:40 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x3, 0xf8, &(0x7f00000000c0)=""/248, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) 20:57:40 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x10}, 0x40) 20:57:40 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2635.716551][T18331] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:41 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x7a000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x0, 0x0, 0x81, 0x0, 0x1}, 0x40) 20:57:41 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000021c0)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000001e80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2636.162251][ T3264] ieee802154 phy0 wpan0: encryption failed: -22 [ 2636.168680][ T3264] ieee802154 phy1 wpan1: encryption failed: -22 [ 2636.565091][T18340] nla_validate_range_unsigned: 4 callbacks suppressed [ 2636.565113][T18340] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2636.598649][T18340] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:42 executing program 1: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000004e00)={0x2, 0x4, 0x40, 0x6, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40) 20:57:42 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x9effffff}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:42 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x3, 0xf8, &(0x7f00000000c0)=""/248, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:57:42 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:42 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0824fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:42 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x9, 0x6, 0x2}, 0x40) 20:57:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x5, 0x0, 0x1}, 0x40) 20:57:42 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0924fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) [ 2637.227325][T18404] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2637.314754][T18404] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:42 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:42 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xa0058000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:42 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x47, 0xa, 0x89, 0x2}, 0x40) [ 2638.058360][T18405] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2638.068669][T18405] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:43 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x47, 0xa, 0x89}, 0x40) 20:57:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x47, 0xa, 0x89}, 0x40) 20:57:43 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xf0ffffff}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:43 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:43 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000000ba369631000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a62bdfda7cb07e47da963dcf30b9ce4bdd0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000a80)={&(0x7f0000000740)=@l2tp={0x2, 0x0, @multicast1, 0x3}, 0x80, &(0x7f0000000a00)=[{&(0x7f00000007c0)="eab5d4e4bdb49cf8d25862c18b17762acb668dd8e256a807020e5cd25f54fb70200b8ca2f64cb4a1fc4b89", 0x2b}, {&(0x7f0000000800)="96e9ca9ddfea05407a4c8bdbe681cb679909dac8391dc1df168415e1e111ab3c804d", 0x22}, {&(0x7f0000000840)="1e6b693b9faf90c0d4b2cb0be3874f8cbb9f5c9f9e245c7f40b55b004d1435923860a9002fa5233c3963ab5d6f53d44a52471173dc1964b934fb9ba66a84fc2a1f8f815af46168", 0x47}, {&(0x7f00000008c0)="a2a5b7f201621c352f283d7e62d0", 0xe}, {&(0x7f0000000900)="b306da331e558d7d81b4768816486d1c469736c9c8f7a98564a82659488a4a87e5c5fe8227c8fc99f620fcbf30e23fb4b5a155ab7372e5d4a0004989c8792d09ae0e278b134fffdff2f0a585ce617ce8d96b610efd399e9dc0a3f32c69bd0c168e9bfca2c55732044035fb49c8aaebb3bd1accc5c80f3cbd734af15329368ffe695d1887ba5c3b9bf649330e63db4aa9687d362a20f2a3476331bbb0540112e22ab6d335afe1a28803e130157645c5e9b88efb5d361a244c9165eb107fb406b192456d8f5b30d6f9f932c26455149fd5645a4e60318af8", 0xd7}], 0x5}, 0x4000084) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000ac0), 0x8) sendmsg$kcm(r2, &(0x7f0000001180)={&(0x7f0000000b00)=@un=@abs={0x0, 0x0, 0x4e23}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000b80)="dafbd97c1eac5e2b48e79a066a209927807e0257c6c8fd5fd8fcf38d06c797b004f4327a5064c8a347aab05252db7cde24df370f24ff5da603285bc2e06a2784c57de4f547c34140930d6f78dedd3841bfd267df800070bb660ec27ef5f61786c284d7c25e264a594a2a9c6c9bdaffd7567d5191502a2690da9d8fbb40fa621de188", 0x82}, {&(0x7f0000001900)="dcd3878a28e18812a0f7d4f377d8a04ff254f56df7541078c3b85c1baa4cfa0e146ca71a6d953e81d63a93d6025d3c1383f488351871cc54937447e3df090122b250fa32517c8b9af57d4b0a863736bf2ef82d4b37cb7265a67c9cadfd9a8c45965b5acaa1e96e8469e793d7db9f528b0d0ad1f1c6e1d71382a06fb957bb1024f2f01a2839e8360129dd14c38f57dac932e1f163a8909b351043d560e32960c6199d48b21f0d666a202b50e4ff8fd8e4d561f3c2d62c0a46b443efbb3281ddc71600c0c3385784ff5fccf827755598fb21f76095218af12c55654f892defad76b6c939b2109326271b505f100d0bbd875da9712247c3928c989930b995310732a6d69a02bf712fbb8a842b970f911241b367e6d78a08d379b826c5356f5fb10bb000512f0b9415b46bef221a28c0db950ab731ff4d71d6747d20033ec1b51a56e049bd9871d6e41645e79d7e72de725f3b3a0b566dec73d4ce04e12754309fb3f5591820ef7e2ea42157d09dbfdfc54318cc0a3c6d2aed4fb57f5dd99dc557e0866b41ec1513723dfe932024bf084e5592824b4aff33e269c38e32296365bb341793137b5cc1ac3beb3b7508541fe6f3e7c67d510a1f616c1ce55cb2b63d54f26ea8bd6b5f4aff1bf598e9e0c073ec7e55849b4c5a9b5c0594e1a7f300f173445a4d3f472f27f411c67ce5cd8c84b6767416a135a69e9aeebecb545443875c215000f01cd299156e0876be0ff0a55607904dd9c25e81529ae20e4aa97b04d8d682f3faf44602e6b0b2f9e5989c4fdfb17c6b6760f18a8a0cccf2b2a7f2ea1f02e064025b9bb90db0745476808f5306447d70235a272c17df7962c825e2a5694e32c2c43337f6ff13cca2f759fff57f9107eac70f74fff7f25d7e737aeab9eed9b0bfe777d2acabc48a48555f36d9d9dbd50fa0595de26706b24677002dc02a01a68cb49dc78acdd7e70f98b9609924ea2c45df4a46cf2752b787e972a3e1657d4e41911f3b78a3cb53b0bd385109c961fd409a834c375d82bc6451409bd098de6e70add535909d85e2a9a5374adabba6264bb1e7d8cb5c04559bddc9f7ec4acf14bcc9c0430d08ba1a0eb054e31c6c318343c3c648dddfcab2f832f190cd6c6d0851101219e281b166db36c0fe1400facde3891b7e382f3c16028312884ac5967bb51e77f418b1a55c2b03c0b2af727cab5286491f2e46a64aa40d0cb29786ac1b1773e3cc57e7a164a5f9d8b7f4e71db519994f3c0a70b73a92d867b9b0003091591ad3a48ab462e180999b3bc54ff890e1bf34e9a82028e48d8617155130b92593a8123041f9acee4fc4e9de9f1f653bb1e322893a5e9cdcc836ede9004c1a444565cec8747448aa8824a85268257d49587dfe4928c8584ab18a5afea9ea50cc3e2caf96bf745b16dc891148ea262a61babaac0818f9601414d2089d060ed23a3ac70da984064840caa431e9dee03195910ed3e0a47925a077c16692380edada40ae231048f8d4629bd9f2657c4bc2f2a39e6bae75e716930ece36b272595a470d2ab943734af5b9fbcf10973ec139ac1cebc4158e067071b07f46470ed0c37d9b6e59e3349d4e1c09b3feb1089e16f9f5d9d1651ef1cab0ae4e75dc90cb6a11b00de05122bb23b11f2b75b698627d9bf9ba0c5d2e96805594278b865bc72f5c933d5bedf759947c5b0d166a1b96ad2a49edcf3e4721730fb775a68f48ed522800e51a19884e2b3ed32236e2699154040b55d9cdbf66d2c71d030f624041d53d31d04faaf4ec52a1a011c034d785c05f6d988992fec626a18dddb6d173ebccb715578136d6efe070acce33a1c2f03b1719850eddd0d7becf293d48134e5b2e7326b0494b836fcdd55daf13705b990b1a74c4fb5a6ecbb439b4db75c3fd5bba329f78d3fb4cfbc9bf384519106d1980a6f8f50384a0779f9196c5c7fde10ed5f675dd2ed11d49207f22056362b34054074162b736c2ff4f474ffa44cb1e75a6680a08f3b3e6cf58a5e66f4c8adc8a994d9acc8c19805ed1253532b3c07b2fdd32ba70ae240fd4f2ac5854da3af8d87381e3dc5c89349da4388a67bfadf0c8b1c49d2cba2726e88518088f2c9b7665a36cc14f2125894088bd173bdbe7e39923ae1fdff9638222485260b93fd4b139d2b7fc65b9f8ca1dd0e027b827126491ab53077fc8cb8baab5766677bb56f1d8267e9a38e1bc9572cca9a79ab833eedc35807ce74e8252198146f4d290b038cba586f025fa7114dcba7f5fb8adbd5aab664a46245bbbcecae191c2c5245fe928bc75ec4c81ebf5ac0fde9240e21f1f4053ba6d069e888ae8b86936c8aea5dd13a4670449bdd34b42e9984089979b718e1a94b66473002f9761ea20415fc117e0674a0675b7699bfc6366741c21bee337d1a678530fff637618cdf445caf281b5dcfa1e7f853c2b7f46a32c9e9ce90bbc550ef03cc0912683baadec8819c84c07c2a79d6e91d818f19834667e6bbc66e076537aa2a044e1adf1a8e88df1744a60351c682b3c28fa0277dd7aeb3f9a9ce19666f45753b0525f992bed3e2242a811bbf441d7be0fecffb96cec0d06044344002763b5516a0ac1b19fcbdd7c21c543e140d556b50ee924e09f490335d1f20d09d65740cfee5e667d5a9120ec85431a0bd4e2d0b65982f56c6f6e7997974ab6dfd2cd6e8358dbd51cbcadc5e2a4105a586c3f7ce36f5f48b8e1a67edbfd000b86ca184e9541431918474754f9f3357da88e59b1bee1cbe4d116c695055d1cd21207c3da71036465bb9bab8d2c8ed863ddca9b7bd7b0770207ae93bc42ac0157ab52d84c51a3854cfe68a98f0050295fc39771a873829076ca09a83154373ef36fccaf912277a870977ea3b2094847002d112006bb21a3b3d227db9c4d6da32793ef8c164f4cfdecafd032542638720f63794251e1874ef6982493adec130b5ad55920fbfee5f77217c2fb18a87c6ae7b0c27685dbdbaa927fc9daa6c55fbae9f1001fcfba37303277415888d8e60ac5c4053c10399a0b2f46a512b8325017ee6e1254aa9b4203376cd2e62acf886f7134790aae2a18cba87fc45665f9d18045dbd4548dfe3688e18fadb4362f14c8a59277f012bfa91efd9877fff511549f9cc7efb2b46d8dabad7693dceaf5ee85d847ff5345c566af74444edc8ead4cce2b1e4bd03a0362982f6c3d77416120bfa5beb09b95209ce66fe43ff1402b71de44f479fbe4a8a31af261eb4b07f26b18a53d754266fabe740bd70b9bc471ec7f19a6a56430061e98bb80c76da58fcf227f21b16e12537bcb4390db6ece3d31f4c81e53b603e3080a08a485acac76381bcd0173c8b1d417d790a77d4167d50f5de13b2b6417c9bc889c3b6856cc1b0fbfef05592b5cf8b53aa80ff12d982374c8a02bb95d8fc18bfaa55b34e335fbda62d3e2afea12ba8841bda358dfed2e13cc7098982f5b1835da7c484aa2d386bf146286b02b099ce85a6980d9b0e9072121d27ce9b8bf001e109b582998ec7b546eaa71a9c0690eef82171de50d73813fa464ab156ed79da13ccc30f213bf33bea626985dc7b4aa63ab511012bc533e612b4670d7fe30d763b6feb62b93ea3461ef87d24d2bbac57488eb09278150640e3e2bad004fb4695f2430a78399c7534a505de342213ce07d219f6a1383b0519026ced1f9febfb5d9c7caac396a6f1e6791b85f8ffb2985747ed5114cb601e4b42b8a99b005ea297c886e0f4a304aaf1d0f8af25b3220386d6f5bc31604a439be3752de926f7ba8f5a1e979424553d196842b196e0b3e170f8292c9eee2cf480634382c02abe9f8b1fb597f9f71886a99fb7d330e1d0a37c3c8594622f1673241a80562a680e641cd1ad1abd96289d012e7e6d7b8faf25a0c4d57416ae1ca3d9242ddbdc5535bab1226eeea040fddfcf1b1d9deb5c499f06849bb9087570d90b40481fbecebc6ea33443bfec549eb670707bdbe60e9bddaf5604e76b621a53ed3feb677850298477122ff7fe512763ee9e7852b0146151a19d3687e8311471322756ea8b37d249e78ac8ddde155e4d01135e57e6d8f1e5c9b48ab099d7a96e1fdab86325b73a4cda066e0c15c54a86dfc596900dc16ffa99e875f7aaa0fa2362f36b630578b383fd128f02230bb94735c3e58044da4c3f7743932c4e7108385c65ea27fd071ee4722182717769b580864d336acf4b47f00cf42a2d7c0064798c77a36a89826e7c6c05f03c19cef0c77f230ad5f8e03789b7b752ac2d97285fd98b212a03548bc7e54b2a88c25a0dca59f65258da8d80de4edcfca47c9f13ef0c9624a710d11dccecae59106335adecca4168a3227f687af459dc514afae510d88d983a77720eadcea91b8780ea29cfaad7e6f5f37ef1187ca893fe48c5993b6e34e939b99d8e3b756e6035b92434405ba480dcc706827884acabda099349446fb58a5bc7c9e67811299ffd79d88aef8d0847ed35d153918558b700742acb9b7ab28076a5090805ecdce2ee2137262ed878c19f851936bb560709203a5e10d249a2b0f52020d5a9cbe3ee56b2f572fea177ebe317afaf763c6f82974ce787f0c34ee6de6b1dfdefb883d51ed080bb664a7526d92dbb85f54361b2319c64129cbae450f40cf0aab6e3d65ef6c082d431c82c3cc81ab7460cc00e77c966ef5e9e3dad792273891d0bfe0474f69b8515cd8eb4795598e1748a096232bb4f79a8c1f74aa7831b20e3754ca16489f77387e63f46fb13ca1697af72941d3235ad8e02f3c8b3c34b3939a23aeb97343f469568567bc2c485f33c84c0112778ab2a0d3f9093c44fab837535acc85c882ea859b9b4db91705a63a785de1610fb5f842c782f686fc03d6f65daa3a540a5619b9eba39f315308b066ab9932364db2f35b868462f534cd767632e462ee4e74598ab11f5a7fa97ce2206af5e56a4883e5c6392d969db019a41ec797caa6b986c877e57c669eef49fdb0887c83e8b8fbfcab42e59a5d82c41d13f7307c263d54d55ab4860907495de5920120a86f2ad77d8cb2097a24429cf39abb82e428fff231c7fd4db6108487dcb892a002821e1070ffe9245222f02d7f76de08ff99e4c8a404117f50220907342baab3caf4d92111fc3616160710e7845de7cfa9d1cdf8c3377e7f956218e40cc17888f378003c35335a1fe8b12e3a5a3c0192319218aae5906c780f946e6cf040e698f7929a77313b922475d1608e26901663ef9ada1e58953c750065e633f3e77e2734793997afad6fcff132ccece1941d017f3591dff5386040cd70c2a5359dfe7dae208ee8a8edd0ad77003c251a4aa17d8fe441e50c94be09b114710e2fde371d233aadfb32822f90a46e0840da7d0f564ab2cacb6d5f98c971b356d45889c958a00f2ae335e27f4eb1195a4b6a3f2ebf5e8edb592ead76c9873955bd96eafd817a0d9ccd6bb1d4323c23f73566bab41bde536f261b26639176c0b4cbe6deca142423b3aa09cdcfbfc45f63d811df99e718ba61e24f5519b8dae388bc5be529e8b725683cedad1a5857288a5175dd8058cf42e1b88e920b46667d0abd52a2dc98b65d470f4471b0e12288c5207a2794b0af403111b0af9f8694270d01f8a1873fa5c2bd34f639c479003c9a99c68d0b2ce1a7bd2d010533d68b1e7b2b20a9e01f14f7c0447fc9316a7c116a7adc88f8cb0277a2786d44891e678f06e26093a783de9f9a3a27d316b490ad1847048c8971722e90c7b41e25cec2f876b9a68517418c9764be27f3e3fabea681cc4a8b6e2b46ef83836de702d9ce5a963c6bd535142aa611c11f67da0c673853f9", 0x1000}, {&(0x7f0000000c40)="c72733936544502e3bd02b6df4e6ef363703964f6cd25d0cfdeff984d2dedd0e473a61778805be53d8c70dbd486a130041574291df6e015e93dc1d807c5617670d11b6189a04ebfad069dbaf6609077d83dbee5352b878b65e6856ab893330abdc329b26eb1356f100042c8ffa4c24db5fa58962430ee6c6b58ea40e925fe0713111", 0x82}, {&(0x7f0000000d00)="6b74b85adb1821a75a3e16fea5e1e4f3615b251b88ba59d567213c12b22ca1a5d5ec4241ffeb7d5bbac221f05d9deed4b4ff69fef0c71e2c7376f6961db8bdf2d06448171a76e10b2f82b4bdebabc53f7523ed17018ee4574dc48797771e775af78734b16b814cb76a49091d4bd5d72c703e947ad90b80b1870d52c4f86c8b1d55", 0x81}, {&(0x7f0000000dc0)="21d84682d7137ca602d52fc6e773e1d2a9d96b4772f64581e9cd62bdcb6a277eb146cedd5ca736ae566545ad6b840d05f12159278899d35ecf329cbf8ce5cbe6cd31da16675498e21bad84834cd81d36f460111620be225bd64a146e781b0a2d1e1d219168fd45cfffe5462fb9e316b5606704a1dae50cf319076bb198279fa0991760697789c9285679afa8", 0x8c}], 0x5, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x270}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:43 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0c24fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:43 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='.\x00'}, 0x10) 20:57:44 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x9c040, 0x0) 20:57:44 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xffffe000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) [ 2639.014480][T18477] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2639.059575][T18477] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000005c0)={&(0x7f0000000300)=@abs, 0x6e, 0x0}, 0x801) 20:57:44 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000002ec0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8913, &(0x7f0000002f00)) 20:57:44 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@func={0x2}]}, {0x0, [0x0]}}, &(0x7f0000000140)=""/4096, 0x27, 0x1000, 0x1}, 0x20) 20:57:44 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xfffff000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:44 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) 20:57:44 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2639.960389][T18515] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2639.968637][T18515] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:45 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000095000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) socketpair(0x1a, 0x1, 0x8001, &(0x7f0000000740)) socketpair(0xb, 0x1, 0xfffffff8, &(0x7f0000000780)) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x7, 0x8, &(0x7f00000007c0)=ANY=[@ANYBLOB="180000000200000000000000ff03000018190000", @ANYRES32, @ANYBLOB="000000000000000018330000010000000000000000000000826bf0a6ffffffff9500000000000000"], &(0x7f0000000800)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x3, '\x00', 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0xb, 0xff, 0x1}, 0x10, 0xffffffffffffffff}, 0x78) 20:57:45 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:45 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xffffff7f}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:45 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0e24fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:45 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:45 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2640.831353][T18566] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2640.839676][T18566] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:46 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:46 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d1024fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:46 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xffffff9e}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:46 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:46 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:46 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2642.049344][T18570] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2642.066146][T18570] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:47 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c865294482a7515d5961e821c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=ANY=[@ANYBLOB="85100000feffffffcd2bffff0000000018100000", @ANYRES32, @ANYBLOB="0000000000000000181b0000", @ANYRES32, @ANYBLOB="0000000000000000183100000100000000000003000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x6, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}, @union={0x2, 0x5, 0x0, 0x5, 0x1, 0x8, [{0x0, 0x1, 0x7}, {0x3, 0x2, 0x527}, {0x3, 0x3, 0x7fff}, {0x0, 0x5, 0x4}, {0x2, 0x3, 0x80}]}, @volatile={0xe, 0x0, 0x0, 0x9, 0x5}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x32, 0x0, 0x14, 0x1}, @int={0x3, 0x0, 0x0, 0x1, 0x0, 0x6f, 0x0, 0x5a, 0x1}, @restrict={0xe}, @int={0x3, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x0, 0xc}]}, {0x0, [0x5f, 0x61, 0xf1882d98ada38162, 0x30]}}, &(0x7f0000000900)=""/188, 0xba, 0xbc}, 0x20) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xf, 0x8, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x1, 0x2, 0x2, 0x0, 0x2, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @generic={0x1, 0xe, 0x8, 0x3, 0xffffff2d}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffc00}]}, &(0x7f0000000780)='syzkaller\x00', 0x0, 0x46, &(0x7f00000007c0)=""/70, 0x41000, 0x2, '\x00', 0x0, 0x18, r3, 0x8, &(0x7f0000000a00)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x0, 0xc, 0x200, 0xfffffff8}, 0x10, 0xffffffffffffffff, r4}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:47 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:47 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d1224fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:47 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:47 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e383"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:47 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xfffffff0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) [ 2642.919773][T18651] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2642.992734][T18651] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:48 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x1000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:48 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d1424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:48 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:48 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:48 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e383"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:49 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x40030000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) [ 2644.120010][T18675] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2644.219725][T18675] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:49 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:49 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e383"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:49 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:49 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='hugetlb.2MB.limit_in_bytes\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:49 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x60030000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:49 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d2824fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) [ 2644.998665][T18734] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2645.119639][T18734] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:50 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:50 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x8005a0ffffffff}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:50 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:50 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:51 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xe0ffff00000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:51 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:51 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:51 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:51 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xf0ffffffffffff}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) [ 2646.502404][T18741] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2646.538378][T18741] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:52 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="44e98eb4825c039eb9b04d728e1e87c6ab3352833a7bfaffaac6e4ab07caac904a1f50c5bc9de8a916312a7e79505b385d551eb64bfb047973a8c3dddea961351fb00561cd102bdaf27558c3379516f27bd97d8196d2dd691bfca4c41c5801db4ae75eef5905219074b26c1f2db093952731cd03cb04a452b6615f501b4ad6acf88a32710917f6c7dc65451b7a44742900494a41047e13df63c904c684a687d731196c2fcd927e667de28ca493ce2a72dc3c61750afad1396c54b32d52aa7a0b5cccea24b917351ec2ef63b640f7ddb3f69b99ac56fecce8cbcc579f5666f26d04a92a08a3da91699580081271e7da82817d400ea4c1e52f1b53a96ddc", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000c80)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf3101000000a73e4bf3c7679a6c198eddf0f23e87b58248b46f"], 0x70}, 0x95) socketpair(0x11, 0x0, 0x8, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000f80)={&(0x7f0000000800)=@pppoe={0x18, 0x0, {0x0, @multicast, 'vlan0\x00'}}, 0x80, &(0x7f0000000f00)=[{&(0x7f00000018c0)="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", 0x1000}, {&(0x7f00000009c0)="166a1b08664e89bd98a4ba1dc8a779d5ffaf4ed03a28e76efc0e872ef9abd3fe6c58058ab040fb1f799ec9164117997b4d8e6924c3ac65e4446cc79042415992682d6e671df58f9f324a9d84bd965932fd9d3029bc664da1975ee8e8ceb6a318f03a8f7fd356e8179e10e6d7187a7775d38e27d085143006c2c7382b429e330d852b6cda", 0x84}, {&(0x7f0000000d40)="00ad6a21b9468ec8f9b2ccdfbe315bcbdae1cabf4e2ff6b3e81d94c224365d620e9e6bd6cd9e16feedfc54c4f5d3b9fa47094f604043470f9df3314ed1799084f635b8fa396f282768611a548a4e49ea5db1557313311cf06bceca1b571436f506fca07c87e79e4c55b8abc4276fb67c6957742cb64ad79d34224a519697f9be624f072c242add1b6ed0aed27a58d768d0190e5213cf69c666053dd5c572b64bd5a135af950a9ecb89ec88e860f0b7f2a16893089337325a1bb94e53bd51a3b6684145f782a8104f15a30e7fa0860a9f", 0xd0}, {&(0x7f0000000a80)="6422b9b05a6f527ea2daae157ae1d171cb7554bd3bb3bc00df4f30bf0caacc7618ee1c6fa6d7298b8f4058ed01190e76ac57a2787030a3bbf834f35e307bd38819b743577ebeb3a791f002012e043aff2d32944885f0789071c6f31336b5db18f260cf5f604878003e6649e161f96c8385686bae9bb146c0b1a7a717758fbdd8c9bf82f91c41218248aba781a7a670fabc208561eef70c092781729da239beb93745a7af12dd2808c9f3b8", 0xab}, {&(0x7f0000000e40)="5a491f51d6f9b0e6e742b2dcd68999330f2ca60ff7a4bb01e397bb6a957e05fe3ef4f5e509c6b0c2e67e0196d27a348c65de2770630f99868a9619d5a7d55ce59414930046f0057613c08872a41b5deb62f03af333aa94667fbf16e5ee0fc737df92c82cca3385591ea14edd03968477ef589fc42127bba80bc28a8f8f2cdf8548968c5905b6eaf36693b052edbdd24586d507ee99fc0bd85e1223162a83fd62c6710dd64d9d897c5ce3d1", 0xab}], 0x5}, 0x4000080) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f0000000fc0)=ANY=[@ANYBLOB="18ae3100000000fbb2f2ffaaec038e1000000000000000000020dcb39a282f781822f9de910f4d4af3cf0d"], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x7}, 0x0, 0x0, 0xffff}, 0x0, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002900)={&(0x7f0000000b40)=@in={0x2, 0x4e20, @remote}, 0x80, &(0x7f0000001340)=[{&(0x7f0000000bc0)="a34f4002ab39538c6076c473cbea7868da390bec669db455215eba41d038d790ac1e71dd3a903f2da8ef6c49091ecebdce56f7d63bd10c301e43863b12151cb0fb283b31da0f28564409e82642f5ee29234f3f039d2cfce5dd61fcf64e7035", 0x5f}, {&(0x7f0000001100)="72c0e60ed849b63597a6acbe847b0ec41aa4962115aabaa4c53fdd525b649a28815b9763cb8ac1940ce96306697f91d5f0a7771b85710370c66e9b4c46d139092f81afe46fd6771281618b546c45e33c448ea561394c05658ba71d1c8dfa4b727ec891ccb7651a18402cbe75b53097067dbd93753e5b643e2171baaa891705635d07a12c848e0b44a241b097e4cf255c788a3fd00d3cf372f49d2113413840d0a5e3c8cc7dd61f686ae772bad33c89b51b799cd2e35eb5f7c62f1e0ab039fc35de2762355a0e2c22154b1ddbca15d3aa4ac6ac2d", 0xd4}, {&(0x7f0000002940)="13818445082da063e4c87f64003ca67a0f44d12b9de2cffec6a1d0bb6cbdd81e3867f2a0bde5b2bb3288219d9cfaa137e0498099e04c3c3a4419f6c2be1072dd2f7f58adb339de86ffae8c234864eb7532edfe9dacb2548efbbb8a6399e696a41736132c6d5a7fceec096516381e0c1d1b382109b480dbb601d616314ebe888c243eb459c1caded7e32527c16456206c627eadf28e1565d14e19641451396ebd57e0e04532a5979590998a97f366c1944f6b25ad9feeaa62ecb1a831f3237a4782ce48185129c48c60d1a341ba5101f6a425138a7d58b0fee812aee7ddb2a920c9bed50e2a94c787a80cdcfaffbe7f63d23173382d983bb925eb1e750a5841042886f74addaf0c7a811ffebf66e029b17c94f69a6cfb514177cf60dbd5e78e875ff4ebab1396d567cc09a7779ff1447b367696de359b29c29cfd9520721489875896f55635bcee150f7053487f0eabc0118123f6123497dc65c9debb43e2ea3da7b5c9", 0x163}, {&(0x7f00000007c0)="b6ec6da59091088e72d851ead79847464fc3783ff3349bdb95c9e015eec105bfd8486a374ef81ab06de101ca5f212c3918fc018fd4980ccaed0d4707", 0x3c}, {&(0x7f0000001240)="3624e02c6a138d9f38b04dfbbbe5ae1b085a930ae0450db27f1bf2c29889209848e8a2e3fe229928a40dc62eb4b3e4210fe42ad2abc7611c306a012e1dec136905bd4a7bd53e", 0x46}, {&(0x7f00000012c0)="09478ef97651d5a4aa9cba4e897ad802a67ec6e38ce0670cdad071a3fed81aac93a2421e8cbce50bbfd265bffec250dfe44d44e8b2958315ee1e02a1331ed858b782fcc0c6fb1609368a4032100172da2348cd349d9104516b08971ebda89826d6f3bd595b79b08158298d6bae187ea935f066", 0x73}], 0x6, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"/864], 0x360}, 0x4004) sendmsg$kcm(r3, &(0x7f0000000c40)={&(0x7f0000000740)=@l2={0x1f, 0x6, @none, 0x1}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000900)="93a2d3671ce9d9e8da625c0373a1981c9c0069083663b74fdb36713f25e98effb74e1228071112939f19d344328b74d0f372fd3f7de6742972845127c02a3620e7dcf24ad48940da77b8d030f2b8b037d56a612331bde24bfee59e94e3ff33ce9b50c3f4084ac29cd031617dec57b486be0328646aa497a4d129f82e6adf394066f71ec2d7c0658db76979e2d85c8568513d2d423c8ef075f0eb05dc3723e08a1994c42b09bbd8f7d0f8fcd3", 0xac}, {&(0x7f0000000880)="4f7d6e6c28a4b2bbf22959f8", 0xc}], 0x2, &(0x7f0000000d00)=ANY=[@ANYRES16=r1], 0x328}, 0x4000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:52 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:52 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:52 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x100000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:52 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}]}) 20:57:52 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d3324fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) [ 2647.974947][T18856] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2647.992514][T18856] netlink: 'syz-executor.1': attribute type 9 has an invalid length. [ 2648.007959][T18856] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2648.296691][T18857] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2648.361409][T18857] netlink: 'syz-executor.1': attribute type 9 has an invalid length. 20:57:53 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x200000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) [ 2648.405686][T18857] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:53 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000001740)=""/199, 0x40f00, 0x14, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x1}, 0x10}, 0x78) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:53 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d3524fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:53 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:53 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}]}) 20:57:53 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2648.849576][T18878] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2648.874251][T18878] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:54 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x300000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:54 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:54 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}]}) 20:57:54 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:54 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x400000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:55 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2649.979215][T18881] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2649.987776][T18881] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:55 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d5b24fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:55 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x8, 0xf9, 0x0, 0x5, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0xfffc}, 0x0, 0x5, r2, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r3, 0x8912, 0x400308) 20:57:55 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:55 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x500000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:55 executing program 4: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x6d, &(0x7f0000000000)='/proc/\x00\x00\x00s(\xbb\xe6r\xd5@t\xa3\xdb\x1f\xa7\x87e\xf44'}, 0x30) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x5890, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x20, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f0000000500)=ANY=[@ANYBLOB="18390000040000000000000000001500f662b587f3c236bece337206d361074480ed989a37ffbb86605b5e48397e2e207ddf74bcd1bf8ffa1364da2d9343653c250b052416a9afa96f45b831"], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:55 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:56 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d6324fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:56 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000880)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd88dcab876e2de2437d9faf8829d582973fafd52a16aa6b351eda6f4fc878"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0xd, 0x4, 0xfffffffa, 0x1, 0x1000, 0xffffffffffffffff, 0xa93, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x40) r1 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000580)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xd7, &(0x7f0000000740)=""/215, 0x40f00, 0x14, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x101, 0x2}, 0x10}, 0x78) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:56 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x600000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:56 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:56 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2651.303802][T18962] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 2651.347067][T18962] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.4'. 20:57:56 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d6c24fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:56 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x700000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:57 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:57 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:57 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x800000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) [ 2652.528824][T18984] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2652.557694][T18984] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:57 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:57 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:57 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x900000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) [ 2653.153601][T19022] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2653.175044][T19022] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:58 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="44e98eb4825c039eb9b04d728e1e87c6ab3352833a7bfaffaac6e4ab07caac904a1f50c5bc9de8a916312a7e79505b385d551eb64bfb047973a8c3dddea961351fb00561cd102bdaf27558c3379516f27bd97d8196d2dd691bfca4c41c5801db4ae75eef5905219074b26c1f2db093952731cd03cb04a452b6615f501b4ad6acf88a32710917f6c7dc65451b7a44742900494a41047e13df63c904c684a687d731196c2fcd927e667de28ca493ce2a72dc3c61750afad1396c54b32d52aa7a0b5cccea24b917351ec2ef63b640f7ddb3f69b99ac56fecce8cbcc579f5666f26d04a92a08a3da91699580081271e7da82817d400ea4c1e52f1b53a96ddc", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(r0, 0x0, 0x4000000) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=ANY=[@ANYBLOB='\x00'/16], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0xf9, 0xd9, &(0x7f0000000740)="993f2cf23fd13893402f4864b88f3c9c201e0fb1651e454c14dc9cbce0ba6f80728b90655522491e11977f8f6346ec83d5fd6c65119783f60ccfae8b2ee6f3a26a232002266961e505ea0f6a953ef74d2296caf1e104321ca6cc21e618cc721ec0b6fdd4b300810add3a22a9a34a9f0f526c15b27ac73d377aadf47f6e518f919ca39ba1c53cbcbc9327843d6209651da79dea911f0d714451b76b2d8b838a9e7e18395a1dd75abe87db96980e23ae24f1279efae81815dbf361941bd2a59355f31382fe3af1049d34eae0c5a3404cdcfd32d3079656d7e7a93f45a9949f6e1e5d126d508e7d72cb5914a321648e10a48599a7ba4c557e216b", &(0x7f0000000840)=""/217, 0x20, 0x0, 0x95, 0xa, &(0x7f0000000940)="797091df9385d383d5611942e0bf0003bb8efe43241bccceb1faaafa56c3d141edaec0e20d51c9cf14ef89837ad7ef9c8b84b6799c9a1bd25c2a379245cad4da46bf85a2580ed1a08470f8ad801d8783fe9602bc7de690fc12c0e22268f408a9b7f69810bfeab82c22d2f7f00c52ef5cc7281be2375adf94dd639c4b8202c5ad8498838a0c26de3adeea9bf281ff3b4e9f1b7677a8", &(0x7f0000000a00)="b40f73758c8c9d5252b3", 0x0, 0x6}, 0x48) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:57:58 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:58 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, 0x0, &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:58 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xe00000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:57:58 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:58 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0428fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) [ 2654.031333][T19106] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2654.342638][T19106] netlink: 'syz-executor.1': attribute type 9 has an invalid length. 20:57:59 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xf00000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) [ 2654.518394][T19106] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2654.555291][T19113] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 20:57:59 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, 0x0, &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2654.598218][T19113] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:59 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:57:59 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:00 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x1f00000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:58:00 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2655.888500][T19104] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2655.910137][T19104] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2656.256917][T19118] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2656.288129][T19118] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2656.603339][T19106] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2656.619429][T19106] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:58:02 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:02 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, 0x0, &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:02 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x2000000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:58:02 executing program 3: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0xe00000000000000) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:58:02 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="44e98eb4825c039eb9b04d728e1e87c6ab3352833a7bfaffaac6e4ab07caac904a1f50c5bc9de8a916312a7e79505b385d551eb64bfb047973a8c3dddea961351fb00561cd102bdaf27558c3379516f27bd97d8196d2dd691bfca4c41c5801db4ae75eef5905219074b26c1f2db093952731cd03cb04a452b6615f501b4ad6acf88a32710917f6c7dc65451b7a44742900494a41047e13df63c904c684a687d731196c2fcd927e667de28ca493ce2a72dc3c61750afad1396c54b32d52aa7a0b5cccea24b917351ec2ef63b640f7ddb3f69b99ac56fecce8cbcc579f5666f26d04a92a08a3da91699580081271e7da82817d400ea4c1e52f1b53a96ddc", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000740)=@ll={0x11, 0x11, 0x0, 0x1, 0x1f, 0x6, @multicast}, 0x80, &(0x7f0000000a80), 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="2800000000000000110000007f0000001ed2fc2a5b732e7910784bf13ff9ae4275950e170000000046b09d016d0f3307fced1afa0d4972496e017624f11362a076f32178ccb65351919b"], 0x28}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f00000007c0)=ANY=[@ANYBLOB="fb3f7d620000", @ANYRES32, @ANYBLOB="0000000000000000181b0000", @ANYRES32, @ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x1, 0xffffffff, 0x1, 0x2}, 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x7, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000006c0)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x2, {0xa, 0x4e21, 0x0, @mcast2, 0x301}}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:58:02 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0433fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) [ 2657.044177][T19207] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 2657.092660][T19207] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.3'. 20:58:02 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x3d0f000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:58:03 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:03 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:03 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x3f00000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) [ 2658.333183][T19208] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2658.355374][T19208] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. 20:58:03 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:03 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:03 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:04 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x4000000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:58:04 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:04 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2659.676179][T19224] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2659.723341][T19224] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2660.175630][T19230] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2660.187979][T19230] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2660.355318][T19228] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2660.365986][T19228] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:58:05 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:05 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x4800000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:58:05 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x0, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:05 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:05 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000a00)=ANY=[@ANYBLOB="85100000feffffffcd2bffff0000000018100000", @ANYRES32, @ANYBLOB="00000000000053ba68a943f9b575ce8f218318c7348edae678e8d85cc7c777e4a34b3d7929932a238c555ad47bc7a0a1dba57938d18d84e08fb5a185f04a4407169eb112f4942af5186bc3ba927679c55cf971fc3456f93ac490000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000183100000100000000000000000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(r3, &(0x7f00000009c0)={&(0x7f0000000740)=@nfc_llcp={0x27, 0x1, 0x1, 0x6, 0x8, 0x8, "0fe614010b147c9398d6ca57aebec385b96ccd1afbd37b48bd92ab17b6a71020a3c70e41515fd7ed44099d5784ae905e9034adfd12305feeb3e5d3b29d8aa4", 0x11}, 0x80, &(0x7f0000000980)=[{&(0x7f00000007c0)="d8cd32e1f1c7c0b2e925c0db1156d12003c1e9453b9bfae2f55b7be72c99b1f7d0f4bd67d80659f9a341c3be8b6eb74929c5854597a973cc70405255d63e945bc5697af8e660f83c943b935920d1093453fc5a08f52ac8d1ad0f724300ecd1a08a85fa2b6c3fc9e1c4acc67ecc77a6c158f923392913d0435d6f1859017c7f0b54f5a46f1ccd165e9986dc27d6334c356715943367d22eb2662b5810902f45c2fe8b4075d2b864059104", 0xaa}, {&(0x7f0000000880)="9910de948a57b4acb6ab60e98a7a6821", 0x10}, {&(0x7f00000008c0)="642cc7ebf1715ab4225eeff428dc2a5d8da83e2ffcd7d92a5e8216589e6ed8945e6d451fa5e30d4ca9056116248f83b7cf78bc648d9414ea64dff7089a239f868ec87e432f3bf46679d0a4ce91124bb57541f0015801ceea195ef0dd2aa95554a079e9046b0a2989767a5b3441c42116209427e6dd88d1a81bb0ccf2141a9d760c868dd48dea641750c5bb15b20f9d8d61e33167c4a5b3b314b02b5247e0", 0x9e}], 0x3}, 0x4000) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:58:05 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0435fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) [ 2660.769388][T19354] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2660.845027][T19354] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. 20:58:06 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x4c00000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:58:06 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xa8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:06 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x0, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:06 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:06 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x6000000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:58:07 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x0, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:07 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xa8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:07 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x6518000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:58:07 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:08 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) [ 2662.843518][T19375] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2662.890627][T19375] netlink: 'syz-executor.1': attribute type 9 has an invalid length. [ 2662.914714][T19375] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2662.965709][T19368] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2663.004399][T19368] netlink: 'syz-executor.1': attribute type 9 has an invalid length. [ 2663.179705][T19368] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2663.238759][T19360] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2663.249551][T19360] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2663.748915][T19382] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2663.762472][T19382] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:58:09 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="44e98eb4825c039eb9b04d728e1e87c6ab3352833a7bfaffaac6e4ab07caac904a1f50c5bc9de8a916312a7e79505b385d551eb64bfb047973a8c3dddea961351fb00561cd102bdaf27558c3379516f27bd97d8196d2dd691bfca4c41c5801db4ae75eef5905219074b26c1f2db093952731cd03cb04a452b6615f501b4ad6acf88a32710917f6c7dc65451b7a44742900494a41047e13df63c904c684a687d731196c2fcd927e667de28ca493ce2a72dc3c61750afad1396c54b32d52aa7a0b5cccea24b917351ec2ef63b640f7ddb3f69b99ac56fecce8cbcc579f5666f26d04a92a08a3da91699580081271e7da82817d400ea4c1e52f1b53a96ddc", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000d80)={&(0x7f0000000740)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000c80)=[{&(0x7f00000007c0)="38ce782438975086076d198cf6fa0110e01bd81f60074b6499952cc7b62f431e9ac5637a08691dfb221c94432bfd46b2603e22096885e4216229e8160c24ffb486116d9b0415316b25e83c016b5721f9240fd138cbc7da332285cebf6ea542b7446ebd7fa62ee02be1c7ff7028a910327724129e79dac7d302b8b9765a93c5222e85579cd8d58b3da9180156432f62fe43dd8942ded77a7830d10b24ae25111b000f6f71d1e441a335ecd804acfd2e6f063b94e725f6a113b8bdeef08d074e403454cfa1b75af9c2acafae8bcee78dd5ba7d7233ffbd87080370529c798f5661", 0xe0}, {&(0x7f0000001900)="7f3f3df792d4a033552d7a3263d7602e44e7c3045b3af851f947463edce11afa3acb478c05ba0c4d27034e7497b36681de5091a7e0b54d2f18173670d4c8452069248e455cfda973c0510de4f0d445254d0583d23f23fcbaf86ff2e93823baf2456758790dfd8d8676be4b53fb8b603ccc1e1b6dd0d9fe7c9a6fb077c6dd325b7b3d2cdefec3a53c9e372b09d04b5959225e9d377a4f814d8d38a6ec406d6c8b8b6f1da858e64d6d2fb74b941d23fd6f71fac8b2b6e6fe6da1d02c34ce096d67ffbd3a0cbb3d52e82bb8d50cefa4d1b78a219ed755bdd362e48a39d2bb5a6a53e4ade00c5322554a4fd4bf6f12e6e807e351e2ad41a3ff30f3a99190707d0700cfc64b54a71c562abb46bd880bd726c4c60257042c20ae86ac3e06d7fa2a4f44d28f243c2dee651cde4ea21a9a6eee96c1da6d23327ff3dddbace3dd29383857cb2257a74692c841c4420d4fdb9883d897e3eaeb3fcdfaddc9ba8cd174dbbbbdd0f75f414b85c74e5cc72f05eed3c4005daa96df3825be7b41b6ef2b8cca038575636fa2753df38a729471c157e1b552bc8289917793f06cf2cd7b4aa396afd4628b7c995997e3c4788b7e594c7f9075f310543f0b81ce647a53b6ff1b2f919974872c34d79e2200d8f9f12659dddaa533c7976e2f410b1157d0fb8d515e61505eb802cab81cbd438b8d9a6b4ae06c09ccbf74b40e0bdccca5e299e29e983e84e0b8dd20565aa45673230b90d44e064adfa640c48579277ad9e158d8881b469896ab43fb3a18f8b233aa6c75dd36bf3769c93138f4ebdd55aae69de24fee3e904d1cd330d0e12d7eacc33ab998a7ab6c5689aa60abb6e564bb53996ea6103d0317d4da7cbfdf01500b44edf0a9d50affa594fcbb7c44d6c096a3050ce609cdffcca5369c9a4473e67e8f2a86def34be2d5060b5057c36d0ba2a90446899c021f764ac8e58e2006b1be00b16b1fe9bbfcd9e55dbcbc5652dc346a74b67d0772d5dd4b8a613c98084423c5a7b28b7b6c5db790f5fc0ed61bbc6f8970b8038b3956e35fa59532d47da94982d9cbd8abb784affbef7c1a39694b7c317adbd9b76bf778ea67cc9a5c790b83f077b6059b08af7fa96b940655c74627a057da9941b606071ab3fc01d8625232aeed477d5ad2d0ba348299b80d7add3c6c7c28cf4889a4e44ad5845b4a352c296955afc837f521e230c914d3cf1221283d53aa36a0a77a32a2de527c01e1a0ab78dba446cdd503056ed9069d6e66ad8e111ce81bf919dc8fcad029a9e161b40f38bd9f7ad59f8fd93ac8691c8d224e92626d54bf174a17052dae51e22004314eb0f8e0de0d749a02603607b388fdd06b4bd22646daa78cf43826a94283a4afa36470638a4107cf80742bc386fb134afb12f1337d8f01e1c127326a3a01618e51e14ac79ab9ddf5d96df01c2922417077c4cd7d61877f190f2c944914fefee2d6fb8bc75a6a2d5f08cc29734e68c1f35f3af093e697347d36abdd423229559f4019c7b0b774e7e9cd9e89e23d0de9b9232e3c3fa6dfaa3189bcfe3ab57651056bd7d8c6093c51556359fee4903816da0fc34bf34806bcd6dabf50206f7826864534ce27f93dea8721736664cca47cba82035164c08c656bae496a131e96209957fb87f91eda3183a6c003c51486370b9bac1b0d8db865edabad6a984a4a0ccf11cd1c05fb6a84a0a1b08e5908c885c085e71e9ff11b108b6fddddf6e6b4d80915593b7bfb50da4c21f0f3a2ee18443b52a970576c5840d375b610c507fae292d92699d026c872d6e8cd778a2da70d04375627d4649dd85340a1537f3d2fd30071292fec661d8459ff6de8509f66da324c4bb208cecc400aab922e660c57ade5b906ed7c0e52f5ec0d2ba8eb194de6c528b0d2ca3bf0cacb497334bbb7bbb7323cfdf914ea5d635a2c783818741fc1ce37e5b3b27d7533ca3fcb25984109439acb8779518e50b63c7f4553577536bf4d269c0e6769af44f2a2d470683c2ef7ae696f4bcebe935d1fa030e2222099735d06d3245642a77e15ce7c455f104ab36175f05ce34483da471d75c23e685c6c340d647753a5a3e4b6427f020a5ae9693038618c656cc61e16fa48e37a644c62671a31415675152d6a16f2199d844fcd54740f49eb2c0ce81a0d3d1f2d532a4875f4467a58e871e07703961f5aaa32d95cb4303605e1d938dbb476a807083b003f4b434f76c70daa789125172ad444157e96bdae3d4ad69bc07ed755b5621fa1a8f7aa3a6a0b0f34b7134096e2ed7adb37a672786c8418e6a439398f5ddef82c2ef7097a5b9c6a777386c0c24d16720198cac2ad0d1daad53b96693e740102fda2d5bb1a60e9c3ceede85c888680cbd5ff66ed4cc5db509911912cb6ae7526e71adca5aff1ae69c4e6db9e6b9899719fde35df9a2d9294fde16ecc60d6972725c224c1e3a5ea0159b5076d9631b68fe2b168db8c7190902b052aa9e4cfafd7a3eb348ac54cf2d232cd60645b021185e6b963a12b5f30a699d32b1ab72e24bb5b68008f1cd7a492f993c778d66a785ffa5a42114b76c26c11812891ef27232ff35e44d3cf2721f264a8b9916c8fbce144159886be4bc6a15acb6885c805431980682807141b968aaa11778f9d5daf44b27acf917b60327ee61c848bcac48afa7f138dcd46dd0a5d6c26458db9cc8db1f99d5726f5e17921c377e16e1161b3f1a54ee47cca7cd95db580cdc5cf4acbaee7b6a9c23728b3deafdc199048a1d46690feb038b887b6a61ce284c6e76e692c592418d6ba994f12c3f05f14b7e0b75b3fd7c4e89117a2c65e3cac9464a1dfdac2f0499e1372f5a03dd8fa5bc50b6776dd094d7742f521d582cdd99a1120fda6850d5b805984e04ff1d2fe42877c9c84e2ec8d87f86d07afbc674f7079c879d81dd0595d73615a7ed9160989b63fc6e49407beb964f019a72354002a9c4a118c602cbfd1383cee40095ff19c0cd1dc1e485f46d9dd3460f40b71bd82234c55116df47871f241277ea5b84f97bdf088f7b9a7c049e963d112f5eab3a3e675f764573343c3d328b64338209cee94c1078ef044e0a79cbcef2499559cf899e6a6c9703c0c92ba1452751d3358237a316a6c57df61e32c4338e796c31cb073351cb09e367029a53ca09d4a561c1424c567955b502d92325704c7854ab12161ce52b9f3099a71f5aec27802f5a6eb0865a4dd7d97ac63fefc35c48e253583e145d63d7544f69a3d1e46bae714f990488647e5c162b20a7207eea436cd716adb21ed3c6318cb28b58b0104912a33b04710ef9f9a41923c025d62b434e184a0ba6dcea995fde34a2bf58145ac4dfde5f94c21b57795b6851e2a0e200d69c44d9f1e56c2d8ac0171390edaf9c8378b75b14807b17a6d83944896d320126c30250135508251fbb80cc0accfe3931d7ba2cb09a5ebc29b0713ebf41a1bebf2b2097e51a24ca388cb9ff2635e49ef02da64fedcff2631984320ae509ffc8694c3f58029761ce72670dc435fc11e041a4fe674fe309cc32b03b706b0990cc390e3d5e1b1776033b2762374ab78c73e66b8c38315c0f808d78665edcf0c77f8d0ba7635d3148c93265ae48cb1dbe5a0a7b67d25b6ac673b257caf22f3c5629d6bdae1ffb2b3a009d9396ca4c219b29496e1294a927c2d1328015d3f58525f403dbf975226eab190e4e0a5aff8fea08d2e3c49ac21e3abb2e37426404cca031386e80f05f7f2a7c2d2150f0afe7a00f30bac4cc93ca338ae6634f9df40bd966118a8043d2a202582d3caf7f6a315ad371cf6e665c819e48910b51cfdda53f238944818eddc950517826c3f50da34247bdd8ebfda5b6feaabea62a9d353586abbad84feb154ee6c1aa9093562d6ce45b4d52b80e508212fc4a8705a3f1572b708b7be355b6c6287d007efd7dfbcf3d22d607e7796e93f68a5135a13e063d0111cdb5f52a929de3035146a417a404429ab51f334a89f406b6bf5098627c59971a9bc572ab342664b9dac4e22ecc2900fb9b980fea766480ef1376c6cc3a8899ffc45b843f79d4c6f37ae99f60b02d05454e728c7fdf60468483c48dea2e5bc8cc6c2b11e8f825f58efa97db1448607b1180d1731964ddcb40a74dc8717f8a2b1cd6576876db77806517a8ee985e0444ec194c9ef152cc9ba66140fcd545957498fbbbcb0543371afe16d5be0127e1f0040367942640f910c9bcd088a6a5ffa428d3f2a2edd301d4897ac5c9bb7ad4d20a146233546b80568da9e3e52cc36f7e1b1e5fb2db5358a732a7cb430060ff906d5845a8a3e00572523d71bdbcbfad8dfc4df69fdc83935e3f171b24c763eadbf13f7405d2fa85010c8783518921a3dcabe6e46735d1ebc2892dcd14de6e9e49d8cf9a3cc28e3de2a77a16355d385cf54a09c8f62b01ec67bc1685ae0183c6fc805b5093c58b8955447be1387c5187ac9240e5d5e9b1182978ea320d5907dcb5c337c40d6d53cea9a7e6c589fa509e9a41df2ee16e449eee68d44e1804931ab3647ae8ec01aeae58c2e52d7ce42d740858c802c1b1500de599f47babfc553fae577cb0468d237df239356939b2cdc82328728457f3a57b753dfb0dd1288e45fee4e3a8cf36a8069ccafcba63bdb7544ae39494b606066dd873ba59534f5e1e42efda7cc60f5cf1a1483df99b20a5a02319a1e9d4766d3066ea78f166cb5ff1f53bc539e44583824e1cd531a85a0cea8686d98f5f1b11d156ab9d2ae97ee605ff2a0eaee2c7c7e4d80d10236116258a0ed544b2efe388b6bae3266784312c658fcb41f14264bef876c8f1b7b3a44e84d8ba36507b26636e8ca68b1ff8dc80a42251a184305fedc7dee8d9729489a29ef75198ba7f3193c878746cd8f44623619a25e9ef1967d2c58df1efab0a528d3d0a77c00f1865d66591c3ac849e3d1132c956cb5482a121a682796e8255ca481dfc0a729ea94eb3190cfcc1107d722348e9a3f9f5adbcd160bc2c8bb38f40b2b952c53c4c1faabe387bb463db52c1b1fc405430238608d2a21449b4b72ea8e4d2a73e9b9582094667ffb81dfbfab30295b426814600257f8e0a13caf1a80cbb042ac93e6827c757681bb8e29eed233edef49ae90ce3baab685ef09f8247acee64211d79b17a46107f277fd86333d205c5e7572afd56dff90b08e854e42443eeaa61ddb1e1cdd5f81d378dd4168f279f1a86183e4c2365bb646b1439dca91a705d50094618ba023bb0510ca5ee510317ec77b6ebc57cfd7f766fe29aa2362ca318ab93eed00a1b544a8194778dac8e1989cd65c853c4a3ef3bba1db4d500ffb4bdd50a3c913e43c95b1f6cab7bdb6da70de133de800bfd0d5cc0f3c25b1ace10bd8ab8c2eb53e25bbfd9906aa3c8225b661dddbe284dbe4906fb60d1e0cf7035ca55086701d4e606b84c18b550a373d8832a23eee212b58738a1251147aec88b25ce26aad949b5a0f4cbf5219c2a3652b9f90e620daedfddf4230863464ca48779b2893faf12ea2883ec1959f2d1a5cb2143fb9a3fb0d747b1b755796383d98228ef9930ff73c4005fe581e9cbaf7435d3e62717a6374158362a0cbf8c708c0215915fa78d5745470210083f235b9f207f775eb838d081f703cd61301704868d26b1cc69cba8f5b42a59965a1ee3529232d3ed953144c913cb03735c2b31eb02f24403b6338a28026be2452dadb19193d70f868e7cf12c1ba843f8ef4ff57e0c9e5f79ee4dc19fb575d12dccb6a13e2fbae374a7ec5336a7d9a1b93b6506556f55ddeddcd68e2423eada97f5601dd0b2ff11106ce9a3068c9931aa9b1b2afb91d48dacb29", 0x1000}, {&(0x7f00000008c0)="e843572359ec9d20164d9c81c58961b266d1157b8b0dcdcefb57f254a81a85d0859a896e3b6180e90c7ddf2bcb5b7e59c3ccda0c0789bb678625fef811c38f74f3779d5517426867f365f60ef4124e3421a73a08391d85a8850ad149f3", 0x5d}, {&(0x7f0000000940)="973ff1cabacafaf6b06b08a6c8b47f2bda602af8a86d039f3418ce100327ef0f11e8395c463f91a4c747decb9c09ba1f0bd12be8a7e52c20cf40095df53074cd64b48e789eb42d105991a724fd9a9358c7d702c11d6c821eee3e0459f487f2cdc6ca4e9d740431d6a84453b3f5b4b311625586bdff2e34456cb5ed254a1f7a771397e1946e7f31fdf2ccba641917a6d6fddf88f7d065fc28e88095db1ab3d6c51ac05dd166688c1f983186c2cce852e229f87f7dd405cda8f9c2daca3703ae1cafffd7bfb80d328430d833d4d984ff16403ba8a77b3364dc8e5d034f4919bceadd845830173fc7449a28", 0xea}, {&(0x7f0000000a40)="3d1c03fe06c9b2d003ca1bc4d6d0a4a28f6c5d80e1fa54cadc82", 0x1a}, {&(0x7f0000000a80)="f1f124e1f4b82dc8c5262f84127291d9ff0397f65607", 0x16}, {&(0x7f0000000ac0)="c925c2c9b5b374d1720b109c6a2b873fd09484d7b332c0dbeec2d84ac01e64efc7a29f298a5e32b283c06a46f73005808640a7754f696e8b20f972ef0479c85bf5f7d65f8916632987e6fca763099cdd500ebc6d0342c40bef6e850ff6b6fcbb28ab35575872ab8e403996b0b7274acca4488d30612132071e9cbb98cd95213262d2e97e3a99e0e97caa2c749049594f51d1be48550490cf6a9fe5e4aa3f3cd44be7e8e8c957300c58906a6e2cb7cb938e0f1d6328e10fb6013dbbc63dc3eabbfea8583e94cea063d2e97982857df82d0ae2c6f9e58d74f48d70279a0546562a229f6d24e1686057952d0441d22e955c856198ab7e", 0xf5}, {&(0x7f0000000bc0)="990caab27952b7360087af6e1fef7104ca5e164f1ad443a7fd53e12a50dab26ce3369b848fe2c9dc5712fdecca1928ced000110c6b67596c28e42848af94307ca67a9955dd3621cf3a513b9d26bb721553d4799dc965a3c10462fa7594a1e4732cafd60cb84c43f9238f", 0x6a}, {&(0x7f0000000c40)="4b2090a7f929a51bc7e2e4620ed85527997b088370ad64146cb5c36b59759d89f2c95605b8301360a597e34fcf55086d789e39dd", 0x34}], 0x9, &(0x7f0000000d40)}, 0x8041) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000dc0)={@map=r4, r3, 0x3, 0x4, r3}, 0x14) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:58:09 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:09 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x6800000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:58:09 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:09 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:09 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d045bfc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) [ 2664.073864][T19400] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2664.086434][T19400] netlink: 'syz-executor.1': attribute type 9 has an invalid length. [ 2664.096169][T19400] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2664.352828][T19487] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2664.449105][T19487] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. 20:58:09 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x6c00000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:58:10 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:10 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:10 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:10 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x7400000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:58:10 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x0, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2665.646347][T19502] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2665.674508][T19502] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2666.207108][T19524] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2666.220264][T19524] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2666.432326][T19539] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2666.447892][T19539] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:58:11 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) socketpair(0x8, 0x800, 0x8, &(0x7f0000000740)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000e80)={&(0x7f0000000780)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e23, @private=0xa010100}, 0x0, 0x2, 0x4, 0x3}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000800)="4d61ad370567d98fc58521a0876e5182a5fc48febe64ae2fffba75ac4a2b8106645b6de6c72cb0290873577f3d4b4137408c138ea8675393f4260e527f43e9c37fb6a986023862b45a4bffc9edb7a59519ec3c0412cec407f87de95077a8358d28018cdb252ede1ed0a22520daab0004d738e9057fc305d6b5a547b24a2e49ad42bbeea50ad274a0000c848fee", 0x8d}, {&(0x7f00000008c0)="cc903da88f3ea23d88", 0x9}, {&(0x7f0000000900)}, {&(0x7f0000000940)="27e64faeb475e3df1a06fedf26aaf95189f6942c9b52bac4ea21e67dd6a6596d4900d212bbe710366d4eb09bbbf90609d9bc66956532f6bdfeeb0d3d4cffe44983dd70f9080b72815b9de0c5a9c7679f7d25cc3755853600b2396ccc0faebb57e5d9bfce1a197fbd8211f87efb76a13f9e23a9e70fd0b1e6e2ca301e2d4a39e7a43adcfdcfae2c849da00484d3c29a45554a0c58c1c8f17c8bdb74568d1bc1db23011ce3258b94326cbcc3f70f648caf51", 0xb1}], 0x4, &(0x7f0000000a40)=[{0x78, 0x29, 0x5, "4294dcb7e9278d3faff47f7a0dd1beca14719a31ea05efd69bc2800344cfd5f6e7644c47d05b79a4e0f750f7454d40dcef491090271dfc7d60fa0e1c098ff53c523c2dbe90fb961d2dc89406df0173409f1257beca9e7d097d5058b840dce3c3a534"}, {0xb0, 0x105, 0xe10, "299da06d0efaa68dd71565b4b1a40712c6db88cc721c68a3a64d4cb29a5edc563091a866cfbffc5dad8c9896be185f4b6a0704e558ef60a9c46bc716c6702d41d2b88054acadbef687309c61c53c8716d8979312a478be79a4ec8d3d1ed9733c390b2c9d9f998e31bb3b290191605269edc3c7e482bdca95dceeb6f5ca7bfc77dfba4570cf7cc93d02a544d3558935577cd319fcb3ca24e5f688daad"}, {0x110, 0x0, 0x58, "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"}, {0xc8, 0x10a, 0x1, "d058ff17d5cf9612768b7ff9bfc37db52fa165e14e5f99be9712a13f4be8dfcefb5b20c1bc7fea9812642fb06e15fc593417d0b6a7c85d6b1cd8f82b4b9435c041be9f404189d4bd5a62afcee3adfa8e8c0f5d255d3b7b606e699f65cab3579df310f0dc408497b83df4b5a551cbf4e61483da0a46f91d10595ad170502c704877b6a3e55747e226a9dd91b3b0c7ae071a39775954fb7def91e560de718102af7968b2e7d208299910e6984ea8e06f703cac"}, {0xa0, 0x115, 0x5, "1972be5ca5ade36ce0dc843fbc1485d727b25604c9e85ec909f64f263bd354df41a27521d47399dc1164d8bb93f3675f8fd85d63b38c4ccdef941f135921ec9253ea5c438cce16b665147ee12419897d52d86dcddf6df799a6078ad13c771ce04b28b0407c142323ace33b87758ddc1c3bc2c899146c2a9c8bf9828fdde5b9b9e5c592cf7331ca9bda8cbfe545ca55"}, {0x90, 0x109, 0x1, "c19c4f9c9e88ff9745a96205fcf62a560225395dfa29d6d48ebc97e94a3b44658f2b2a6bbb3d1e4fba9ade4b14b8662dfe25aeb4ec44ced85230ced09e7a65acc45b6af081e32ae224335691c3fe19a7658bb2e03f3f2710c658864dbedbaa4ecc5671ea23669fabe2bb20d40d1b7eac8d71d43285c20ead4741fa"}], 0x430}, 0x0) 20:58:11 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:11 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:11 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x7a00000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:58:11 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x0, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:11 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d046cfc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) [ 2666.869703][T19601] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2666.945788][T19601] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. 20:58:12 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x9effffff00000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:58:12 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x0, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:12 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:12 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:12 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xf0ffffff00000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:58:13 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2668.325544][T19623] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2668.341193][T19623] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2668.906861][T19642] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2668.919942][T19642] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2669.122557][T19628] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2669.134497][T19628] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:58:14 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000bc0)={&(0x7f0000000740)=@xdp={0x2c, 0xc, 0x0, 0x39}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000007c0)="969cdcb144334d8bd5073eb3dc464f945684e0cc9d64e5a3c5f8ef5ce97a903a40aac768035974eb66f93e8169c5de37fcaf182864ee", 0x36}, {&(0x7f0000000800)="f6ff39339dc9346fb642b633b18d3d91be4e41b0d76475ce239c50eaa8f13264774c4286936d6dbe39f24d1c485b6105b4c7e60f43535c90e9ee14c779a8e209a5cfeadc59a5ca26dd78f45bdadad13a7884d16a94f2dd15d149d61dd9ff81798e1a11cf0e12284e2307270a38d42eddb86f34917beffe7a7916ce2b18aaf396c503d648638e4372638cc10b163cee5b85c065962b1b06388f06e8434483b2325624fde4df61da12fe67ab5b4474a1f596d67235b1f2d8ba6ac9c22fb9d97321fa629965b7c027905dd947aaca988c16d2b04974b080597652094e00d34cc04932adeb964826", 0xe6}, {&(0x7f0000000900)="40f551758b98facac2d8bbb283878a66e69bbde39a166087ceb11b46d7420fb8420b90c47e4b0449aa8c86008d5e53821063a3c605789ad44b1c57673d79f4b048b6d967facaa03156b9391f3974f89076696afd9384124631dc0a33f03798175e7bf1e3b56baaa2b93c1579e59f4cb5ba5eae14c0a06309ecb59c056e7f9dfb17132c1c7bc3fd631596a86e3639a310c056c3a9c0d3", 0x96}, {&(0x7f00000009c0)="d1398d721a557c9f4f2c254281c725829bc0939ed2a8028fb62dc7545a3e15209eb0abe3813437b4b49c3088518a8587f3ce8359c786d75ad19cdc289e8419ca2c03f8b00c801ff57ca26ef80183e752e8e623926b765db44a32cd303737f88ed0", 0x61}, {&(0x7f0000000a40)="ff0504c3dd8186965a6d9173a7f52978ffeae760d1b82bbc1b5333871a7698effebe6635c003af02e5fe913a9d9f3aad9c0b70c9befb3b6be0bfa1aedf3f923623fa30345596f051da80d8882762a6fb93fdd57ce51abe0bbfc38f8e4033ca5a791fc0f879c3dee8fa7e51c79ba2e86aece6b040c36a658b9b62aadbeddadeae54568e6ced103c52515fb14b9d8c017b3da2394b01bc1e4fdf3a4aa59b2916dcf573965ddc9e1f0bc6878e0970158de90203439166c9d5084b27970f5ef4665ec5af21f7ea9007988fd3c2", 0xcb}, {&(0x7f0000001900)="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", 0x1000}, {&(0x7f0000002900)="c5ef4eee8aae9fc1c025889acd92e803ad08c2bd99e2a566e566ac18349e5bcd6ec6d1ff820361214fb650a84ef384f977454f320cb1a38d565714ec332e8d7172e73ee6e8aa4551b07161ca9e689305c56fee4adb47a3dd6b96a8c6f0b9a32b6b716c6d68d3df802d5d90aab751845a81b5352135209e553ef0509197234dd62f955cd22eb96d7d44e2609cdd03b68ff7410a08acbc28b3bd8e82e0975dc38a234de54b0b2d20917d488155d4fe79fb4f89cf087e1ed96030c556540081698ecdde8ef4e4458f532c017cd355b70213e1caa7ed2ef759276727194d9b0eaa422bd3cd4b8378498452e9fd6d7b7f32fb6b2a424a63994b5053d835c426cc381fcdeeefd4d3900777b879f43030b0c11a1c69c589eb722bfe55586087f6792d4577db724e0112855b5201995315f6215d638021f3bf00e5a2d9aae80d1a5d4b915876d189b1df0d1126ab0d663aec517c69025d7788fdeeca95a001bd028f077ba2f4699d15acd724df80ff86d1e9d0f934a82f1e1adda54b52b3d6555ced066c4e41695f09b191593849dafb05e0a1abfee52302056fccf801ff43dc564a633b2505de9f8bdf2ed0ac6896b4526d4217d3809364d75ab79434456402a7dba29d89fdca958d61774ca549006196819c02ff24c006b6c5c57d12c84e4c21f209f4730a5659065b8d485ebe15cdd2571dec70c718997427ed159a48e6323b1c927c6daf0d9316edbb3ea5ebad41931bc8348897effd93d7d2e09127d5228187d034d3eee35d432a03e689f263bcc22a66199d5105d3c5fe9e3a4855e2021a6dc7a51103e61fc2044cdab3afc087281b1fe59abfafd3dd7f61e5062d83843b5d9b176cb7f1e82527beaef01e3bcf4fea93b48464b2037fba13bc8b8b9834252db63ec006a8b2217bfff501a35b2548e1e77db29e737611ac3fe7b14d360e29935114933ccc0bac4ac17d6962cae245ea5028aa1350bae62fbd9a66552e866df599ad8840eefc38b6dae5f2c4ef1b532c352452bf1e00b52bb7b63cf5da9785e358cb975bf6eec024420a6072652c50d78100357e1302162f0e4bd6e19fac2a95e14039561324c694b96b5d1c9ebb31b518e1053cb78bb2ef4eeb04fb3faec2fda99612168cd443222bffe10efb2bda849bb1fe7adb11559c516a0ea240ffca6c6d91ec6b9d894b0e83f02346c25d824d6933cf544e49b80d55a0b3e974e653613aedd389948264e4f61a5ffa5eb334fc78b8803240dc5a5126140750a531487c2f0b90f6b3b315051565be24dfae2b468a19bfe1f967b3071ed9a0e9b0768394723ff4842825561fbe6593bfb470fa7b0fbb16f1b454089b15571d6b1fcc724c66f21d14b06566bd549c1a66dc006f3defce56b85e08dadd012d98c91a4b0959998465bc1e27b14785f00017f0df77278f56b1ba5efc5e8d1d440aa44fbb77b313a606141d9fe245ffbbb36c95f11a6dadb5c1cdbbea7e7d29edb0c21e4696d452a1ded0d245ec293cf334045dd62f5effa8bad31d439908a03dc82f5a1c1de3780ebc54d4e16ce2e4b02923701357e859de59050411b139241d390a78fe7914c9d6e3dde86537734cfa8b612a07021c95c384c386275a36c48842351ddf3b04314ba6639084075d38b0076b0c685caf96cd5c95ca79b2b3405ebaa127fa1bf2ec9c1da600bb6cffe2d2886070d891a2790dffa35705a4b804c4921644efce95927c7208dada7cc74a0575593b6fb70601ea57cf173020797adf28b39a012e267cafd4fe6b8084d9d202d0f4ee622df0d74c22d9322fd4f02f373d36251a73c93b22937dc60b461f0a87a6d48694a6c7dcbdb956ce03ce9fdf6510e1f202e7b31a36f5afc9f3a159631cb29fde7272cbf8a561fdd08870a4df79e80f9be2b9872a9704b1c2de67dc1301af2d5baaf49ee3ae8ccf57eb117b2ebb91c9d09ba8382992346d29cba66aa4813ad7c5a9b391f5cf139b689a55855f50f6cb0fec04abb2a8da1097ca4a8536a5963d61f864d6b630c68175e62059c84653476ad7d5c9408338f91f168835a363a47dfea9478525bcf16cefb8c8c2a095bbfd46c439cc8f4c969326bbea9bd264bff0ca79eb474d12aeb3e5342ba3db51561b8a83ebe71191e10a832c3636df38030761c547b8403c91cd661e87a2b372ec806a72f69f30cbd04bfe884f9256c2f7f1a71f958384521447d1cfa75c7628f3c6a0f8e10cbaf9d26abb34c1223bfaccece26240d78171ef54b8a3d0a386fbe5ccebe7cc0c4f5e617f2582cff694e090d9ef130948dedb5263ad206c85201da5ffe9d35e0745e9c2aa6e3a311036e12727bbeb0856eeea60ef58a849d0575444591e5b7d0633d49fe5e055c39178945454a13f4b04546d7bf75331d2eac3fed5f15a7edbdce573859b63e2c80509f26ac35ac2bf2ea79a883d0ad04fac53dd6d1d7b78bd105c0899d9d1262c15bc2bf7e50448e0ce8f13101dbb80f2af241499ddd0067e1d92f4763f38ec926453e2bd6284e73382b56d27ac8435e0769499d92a017db834555de29189d31e69753cd35c58fc146fac2f6f2751a3415356e8d93be075b527fff75aee224e97f161ec822e3558fee3f711c8e99bdcad3b0263ae66ed1088bc87566f5ad43c7da3a556f0d32e18d7a458723894aff972ff2dd116b6f362dc456b7258196ef440770cc7f22b938f9a3ac5fe3f90ad3dd9117647c31a29a29f238ce39a29e2f901acec0af422cb912776ab94d16f6d51f9a30b61a3f0375ac7759b591e3dd6bb0ee6eb732b319c4e1dbf8a7243dc86745df7c09bbb3b5e03fbe9c1dc07b108b13af32e8db533c72f0ab3df6fa4017326ac8b65b3f606d209f492776924a8e705062855ba52fad534dc344d5976ec2558455baaa62a283959b17305ed6747c20c6b84da3916d8d44803def046cad24a5295beff3039192192c8a4bc43c295e33c3e13b816d9a3b4ccbc033aaeab40224df17243b7070db2213f0f75d91c4b16d2128d73056b0f2c35c9c9f91824d5795cdf301691d65b4525b8076f29be361dfe8bc9c125c3bdd588e561977fba2ae81551b79f008d9324759c55339769fbc46e60150c4233a57d6a7a21947b3852ccb39c88a7d1d6df09989d76d50d14f7f13d478e839c3b920441a3a551edbccc5e42412f0491721504fa5662a84d1cb217b88594d8e7c277266759e9d321cb605a5181924872e6d38e45353e887e55845637b8241fba0898461d0d4900f26178dabaefc9272bacac79b011c2a8d2f4d9ceee5d4f4d156985eaf988580e8d2b711712b8be614857915092595fe78a1f9bf9776752eaf6163d62026158b8cd617d15d5eb622852f3aaa933e94ff7b0ede32cb5b24455001a8bf4e5a3f47d9d85a080f648a7264d306d8de56a1e27dcaaada998c6546ce9ee2f585a946537de500fda5e52e2b29a60a4338bb0e559f26ddc797f07b2a3222ec3eb22589467fb8104d772aa6279baa921b60626017703d60c8e495742df98a505f8e13cf6e90ea2c4f0643d755f9a522ff5e0870e18aa062bc19fb94ef6f6bc06a49f341c61e8ddcaeff1c9fbdb9c02ec19c68ae6cd6e4bae595cfd6d9c3c94b264b5bce1d35aeec3d550dbc486c3aa40f30d93a8a21e303733e8a1db3c535c48fb976f9c35ebaf7b4e2ce51eea0950c888e5e24934163f33225205e64c167b1fc05b4539cf8b8c93c2a503cc05e1fde9465695d8c1dc7549831cfe411d7a4cc8de866837a96d9c123c72105deb7f2954e5a559a8e2e4e448adec7a23e13d2504b590c35b64f1aef5ff3e57c585a50310c121fe51a8fa74334b18720bf98c3e1570f08eea930432902a6af24a6aab2fe0e42a32ce6d844697d6eaff1e67e5cad5577fcf201a9bd950696d7a6dd4b6f3ea2ab1e9ac1fa744bfc37c2dff9a235728b7da421e8ed2d4ef411256594e8489e17b41f467b4cae4a2394f06d53e0f427f5694e71e6205c11761f6e4a53e731c9d4b022c92eee851df011cde5e60c156af8196b3e4965feb8f7a7417a56cae68614352fa18e9519dc633d3c1be06ad80772fe2ceb66b00769985a3e44e5933e90a64f699ceb8240fe2ca7bc923870e79430654a095cb23544f0473e5256cca26c679f04810099d476b019ac15e725504134d6dfe67350d56fb5a65aadc6b38cf76960ff0aae5848da76c679041bc9ce365122379b61e0a788a09377b9a5dec36e8485a40869b81e85f45dcaf484a853723c6871fb06bf324c78d1f91266b985257bac29df6fcc54982e92fc2e657c2e64c45bf16208b70b61f1e165fdf9afac78bb368c09b11fbae4e6f48c5f97b7c477503d4d55c6336cfbb15e3b1808fe731f8857d965e2238125061b838c43de378157f88f816a090ac42433e913ef9b2f04b8f08a5cb8e9d8bad2e34c20e9b29b50d00776f5b00c71c8db7fccf9c5a08999a3db9c89c25b6aed0f58311818aede54ec020d76d28a6e8e533a53f50e6324e6c5099fd42b4fc5a8838a54e2279c812225ee88c7efbb8189698e6b8ac68c31d8df930b7337e7441784e604cf6f2e75790d2dc48bf367117504c6f339623b98529bca7fb3b939353fba607789914aab4156eb091e9f3379424d156399ac774d91cc81f3001944f3bd1b308437263909c08e87e1d02e8abba48c140f4478c5ad3a76d4410be1affa302379121586bd810377c425253a0448cd8b862932fa4aa5d2c9f36a243e0aacda6a6150119665abd8977559db0fafb897bbedb260c7a31cea3c6683418bde55070be713d2c6151dba826d227349d638cccbf848e1093250a304ff5df2326e56955dcbed20eac9c88ef2f25d82aa1e6ce0fc6da284ff4a68b3150edb3c5557a86e9011104a0113ce1d003047d93a19f8bd5fd504abbd1e12a5574580175d0997f4b6a59a5be59e83b4d70c8e72333f40ec71c32aea52adcf1bc866bab00e44654e2cb1693baa49cfd8b7e5c3cc65ee7e3576e8c2ce5633b702d05b7c19b863ba395bf93b4acf0cc87278ac786650fea4b96375ee4aeab33073317d8290386755326af5182b0e36fc0e5cbe6fa2fc89289ac39b32b7e44a2c05992bcc8edd489a3d1b568aadeb5dbce23b4bfe60e3605725bc6373c6cb1b8b1774b154b9a75437e72aa80c27dcf607d1362dc88c08874046f861e51d72728dc8e10e66e392f4bb1fb15847e0a8ddb9a0e0424514259f6a17f398e3f62f5de950e6dc583fa63b4362fc8fe9e66326cbb0ab94903535602bcc927934ffd53028770d8a8cf0c302d4cba0abf5fe6e586ef2acde3b4013cec26364839f5ffc7f383790739640cdae2c4034a2db438930f2ab2dd5dd9d3a7cc2b87880b6679ecf3094d257b9ff0c2b9701cfcbdafa5ae765dce169135bd549fd13b7c773f1c6f0e5a815842fa05da516399f68355d79602c3d91060985f749ec5a096e3e8a56a68997c8cc6218dc31c8d30b4b24c4028f9b72f0a24a5bc2568ad7528ee0371528ef89742e4c17a5d71d7256309a9a0fd4ec09af569173446308c3fb39fc84ed8a208eb57739ba3c02c773c00a776bdb0376058d163390f7dbc246a5da8b422b5ea073a45a76732ec279c47953aa7a5bcb2670c630b767ef5ed2ff40bee0b1898010f8273ee62c139a7727a3b65bfb14e2eaaae4300dc6c6fbdf90c3e98d0f20bf0b73e20ac07dae7a64203f41b47a29c50e2b29edf6306f2a8f28add727da8df1e417b9f90232e4d2db52d998dab78b6cdc30c51a30e41904e8f6d6c47788087d8ccd22717070556d3eb3b9521369805ab5bca493f652ef9e91880cca5297fb387be4945bb617da5c9", 0x1000}], 0x7}, 0x48004) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:58:14 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:14 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xffffff7f00000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:58:14 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:14 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:14 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc07108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) [ 2669.664309][T19720] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2670.073699][T19720] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. 20:58:15 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:15 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:15 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000740)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200)=0x1200, 0x43408) openat$cgroup_ro(r3, &(0x7f0000000780)='cpu.stat\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:58:15 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xffffffff00000000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:58:15 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:16 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:16 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:16 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xffffffffa0058000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:58:16 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:16 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xfffffffffffff000}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:58:17 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2671.779559][T19752] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2671.843987][T19752] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. 20:58:17 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc0a108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:58:17 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:17 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2672.508020][T19759] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2672.516234][T19759] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2673.588468][T19796] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2673.596809][T19796] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:58:19 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000ec0)=@vsock={0x28, 0x0, 0xffffffff, @host}, 0x80, &(0x7f0000003b80)=[{&(0x7f0000000f40)="58187bc91dd7dd7c10e24ef0abe07a39ea85f6487ee1a2fe83b7c95e756556cbc39539a4b8f233c8b513e1d0b20d9bfdab2fb956acf726c92a702ddef34a99c4a875b498ef9a1d4305c8d276bdd56d09b77f0e5f0c2da79d9e3f01a0a8e78a60d5cceefd91eacc29d89deee8b9c43c3b666a81fd19c3cafa7f2f05242167b25036c0d38b0ec4edf61452c7f9960e980c57cd3f74a3dc0b381ac63e8d5071635286ef6d407c", 0xa5}, {&(0x7f0000001540)="5fb1afb950b505bee4b235bf9a7dd14bc381e49bd5f1d0f8d0755d4a2eea8118816f36abe6acae4158b664db078edefe66646773e8d509b0575a2aeb1f4bc5d464e61ba8bac8b66d01fbd71931682d7b0b1f7ad0eefd1a27f39b559b79bf91dbb36e6a55ad7664a591e25c4b544c716993c01215e524ebad8fedae4c67a8ed84788747c410118348edabd91095e5aea13d389ed7070a376bba6d176a889d26", 0x9f}, {&(0x7f0000001600)="f103f958e6ef63fb0aaf9c7ffe17fa516259ed6756815ddd2fd0a42f8d5bb726503d25afa94621b3d3d5145be10bc661b93473fa8eb6ec54f4ebe7b0895023e4a94da8b955e251627d56b4570b68361fbaf53e5447c96f6f38a56f7d82bdf9bbedae8512b8f1a35560f2385f3e4316894fe6642aaf1f425c859fb0b0ec93abdaefe3f413bf5072692fbe61e872031af7c7b59820a2efbafe99340bf31ae08b275fc61f59550ea17c7468d077a2b1161df38d7563d73573d0f37824f57f16490714", 0xc1}, {&(0x7f00000038c0)="08af9262689dd4b83f0b7a55c2787e94cd7bef18c277c56ed897b92ce834f6445967e3ab1f8e99a156533a368fb9ce8482d369baf6ce7d9d0228e01cf1c109108970a2eddc78a41302a46ac2e072230bfe3f07dfc527877afc0ff948420e3a68a040075425adb1472d10138185c6a37c7a6ddb5a578bc84724971fa8326c410ff73ae6a6aba1e30e7ab4c050c39c98427dfd5806fa6cf0d19a1130089577caac5eff487d", 0xa4}, {&(0x7f0000003980)="171b21fdfa5b96950f738dbd9253f1dd058916e1047108aba066158ac45a9e637aaa6bc3b0fe104ba664f51146f43d824edf8656e1f05ec4312dfabcf9733d10172c34a7cab4af3783acdbfd0fbdf11c72170262c5d743427a22bce7a9908ef6f64042982da2e906439dd924efad978856d0c17ab100a8242cd6263154f3c906a46d3ffc20a0d10900f4b0c20d963fd95e76bb3956de4a8284f283ce40d32736ab180e485bece0be23377c0bf888563835efb512d5188de887b18f21632a1a73f8e48fd00c5d27322516302db5a18c559fcba6", 0xd3}, {&(0x7f0000003a80)="95d827c46818b46aed7176e961d0bd803976797bb2a7fd11333e090e4a76b154bcf57f31e1f962b597ecefe99563936283de212ebbdc784d73746073d3484e3881453e5594", 0x45}, {&(0x7f0000003b00)="674dbf1150789a38e5023a57536a7fb0414feccace506cfea7c9a088b5578e9ca9958eb616a510d62fb20bfa9c69f59fe3bb93d525ef94783ac1f0744f315d02f6505bb62d8bb1ac3c6df19a65196c48403fe289ec1d871197fcc5930f4253ae0e80fa5aebb84166", 0x68}], 0x7, &(0x7f0000003c00)=[{0x70, 0x10f, 0x7fffffff, "e6c02b5e0e962d377667b67c108cd92ce353ad5ab96554c2b9f81db5c161165c6f5f84c7d3cadf74955d0e7841690bd54d9622b602a0a7e3dbf0894c909dbcb840546b8b8df9dc4c443a2eacf206dc2714141a5afa2d220f83e88a"}, {0xb0, 0x112, 0x5b, "8476b54740ae790d562377c8f3be38c0bf893c11e8fee3dda5a29cec7f6135100226ffbaa2718654cd15dcfdc0ac31ef991c30af715630f8aa067af5fa743df915209450c9a18a1e140997e9469de0bb52fb8d7a2f9fe71e3b88a1db110b431a373a73fad6b5d3204b2b0d4a357d32e2854fdffbda729732fcba57dcd4072429730babbaea4e4c9c1b975c3d60baa4563791315c6081b0cca99f2acaf6c0d8"}], 0x120}, 0x4004000) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@un=@abs={0x0, 0x0, 0x4e23}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e6d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2d}, {&(0x7f00000013c0)="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", 0x144}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x7, 0xfe, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x8, 0x8, &(0x7f0000001040)=ANY=[@ANYRESHEX, @ANYRES32, @ANYBLOB="000000000000000018280000", @ANYRES32=0x1, @ANYBLOB="000000000500fe87177102930491cd0000000000000000"], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x1, 0x103}, 0x8, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a00)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000bbd1000000000000ffffffff850000008000000085100000000000001838000003000000000000000000000065e398ff04000000183a00000400000000751f40b791910000000000", @ANYRES32=0x1, @ANYBLOB="000000000000000018270000", @ANYRES32=r2, @ANYBLOB="00000000000800009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x6, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) sendmsg$kcm(r2, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000ac0)="02df93246a8193255be18202e1b6a32aa35346961e2e89958e012ea57287", 0x1e}, {&(0x7f0000000b00)="c03bf851e6f53eea99be1e552962b525f7735694db7c099db06df61f133f988062c153bb7b2f1df3ba1261626321744b0b02a79b99a06a", 0x37}, {&(0x7f00000018c0)="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", 0x1000}, {&(0x7f0000000b40)="fa0d53f4c376bd834d24edea9e721374c4", 0x11}, {&(0x7f0000000b80)="260c8550195d77540041573b96fe1198e9e90c618acdb226d7f591993510b3bfe534b84fc1fd682356c557f66c88e281ff258ff943df0b0d89ccd0c05c0bfb02f8576e14e2e84e6cff89b760b8f7fcaad3a073b443b32c6c9e433ea4029fc77417e00dfaa6e488a0216f0964cc000cff84fff533256f5112d4f70438d968bf49c0537114d566f17db9dd2144813240604220340f688863ce3f6447ae29644f9be0f9b5114b2459cee155642aaa36e5d3bd98056a12f48c862a53978b6fd6d66f73d68e705f23dde6b5aa48facbfb940911c5", 0xd2}], 0x5, &(0x7f00000010c0)=ANY=[@ANYBLOB="50000000000000000000000006000000ee7b897199d32dfec24427cabda3f29f83a20b783a31a225c68cb821d9f5c2896e3e9625098a55dce0db37495921360892a88b76d27e598ae896ebb407e00000c00000000000000000000000000400004ef2568c1c284ceb31e9d86de933a8d72e88e1d69130206d0c9ef908d4b507be789e700ffcf962a41120a4b2b48a0fb298c4a01b333b57aa67cf5ce5a98078085c3226606b2fced125d467b696ca12ee5ddb90cec4e2bcf703d1ab65830d469d0e8e0ecc8b39f96235f3d045be37b3122f41d6f4ffcc8dfaa6cf70d81f12b1a1219e0ea039946ec87d73cffe52e311f064c53bc0c677018f5359793373734281e7c42494a6f13543e0a79eec00000000e0000000000000000c010000fbffffff1128b6d1df516c7d8ec9cf5d53417662ba697687d6c1fca8c13f0a0655a1b7ea15cf5f2d388a82b01dcdb4069453b183981caea356e966f474a343638c74043e2a0f2fb0efd7141ee41045f9017ac8a3ccb127d57dd02c79a72bad790c598b4dae2712644fb8d749d4338d2df3d19e841530825c7d56f9a2f25cebb2e4d47b7134cb1da5f4cb110163b2da1bdcb1314cef9451dbbd7077329fdf52c4bf967ce38db65a8db778943235452233863b4dc53ef72860a5a863185427da5fce289635fc5b8d61e428a7852011b8f936000000300000000000000000000000400000004065ddb2a2d95ce2df5d80caa4366bb211d3cfa08cc6830014524fad58000000c80000000000000016010000000000007e043418b2c10d1075bb9d00bbfa3a522d5349eae047d9d04bcd2e160c7da6c5fe9a632b9922e55577a2946e3000d89dbed36764974b7e0e3747204c92032a88f30cf23d13b50d44da2a4d8c5e576f99483cd5387a331d8280a63fbbc03f69442d3d4bfa037b9271a172e8516babdd2d5827614306757f6401f60d82f07c40dd1b3b3a0cb25a37d4d93bb50de9ec6624fdaa9e9cfe7fb4a8ed18baba65f2f8e25f8a4ae8bff91f23819136dfe1e7e267150000000000000094b725c88ea2a2948249bd86d2bfb7d2ba9e7fd2e364"], 0x2e8}, 0x4000) sendmsg$kcm(r0, &(0x7f00000009c0)={&(0x7f0000000740)=@in6={0xa, 0x4e22, 0x8, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8}, 0x80, &(0x7f0000000980)=[{&(0x7f00000007c0)="e2eac95aa6c191b889fda2a85ae9850e580874c96bb7f923a225b191ce78765630f2c50ddb2911209b76f584a52ea2f9d18b10006a736c4bbd1b8e2adb9031b43a1e4a0836b9f009611b0cf280fde20b9a861a59fa0b8fd7f9deddac1cedfbcc43084f32d56cd42cf506f0e60ed20902dd43f912c6bd0bbcf674cdc03ae45270c7a290b27fa00462a6d50d3f60aa43ccbb4240fbd594dba7725a3b61ff85c5de9d4889ac5b", 0xa5}, {&(0x7f0000000880)="c8f61293a49aa971fc7b5bb6df95605e184ae0d8f55beb7fbb8bd679dd40b2198d1951a6f0f238b031f48b68fe99c70074421692971f82c21a2740c060c8ca8cb97fe82268781c9c234ab2f9d03cada7c914056432b494519f73cdcf88dc4fe18f4b271e26e69775c7cf98df2f0a7504d8a4985b92867acf9afbeabd3a8e8069a18ad9a87e5a57ab74f8d84d4ef4211d840ee3c9504a50d22a7bca260da57481fdeec8fb6d643c1815397da8efdb9c5d3edaa8f83194d29bde7d2a673465f269509cd6f911f83b44fa2d1d27d5d4a374a43a79278669e499e772ec216e304c8122421b8ee28b5e6117b91c028b26", 0xee}], 0x2}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x44, &(0x7f0000000e40)=[{&(0x7f0000000e80)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x2e}, {&(0x7f00000028c0)="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", 0x1000}, {&(0x7f0000000d00)="3c8cd0c5843e8fabd3628bc6cec00ddb4d8ec4b1cc5512b8e006eb7c1b6275bb4807c46e0043433816d6332ef0a2dcc587ac9816a0e0572f42c5dff2da61a248da01f59709929e855a019f1a54277363e4da3e18d9c0b4285122def5cfee6a7799b58065ebb356adf891abb64ce673bf73eea53bf136dae81e74621e68095e584f4ef0ff638ef54492eb8943cf8a2e998c16b030c7f4780a33550328551e2a0ce17a0490fbb19b1df222e744d6f12cbb6e74838af636582acfbcc1e7b131f02ed8069681d61a659c559f5394fa048f64fab74b9a8677", 0xd6}, {&(0x7f0000000e00)="5425afc144235fb31a87103c8506c2bbc0de06e7", 0x14}], 0x4}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:58:19 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:58:19 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@permit_directio}]}) mount$bpf(0x0, &(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:19 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:19 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2673.832303][T19850] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2673.853767][T19850] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. 20:58:19 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="44e98eb4825c039eb9b04d728e1e87c6ab3352833a7bfaffaac6e4ab07caac904a1f50c5bc9de8a916312a7e79505b385d551eb64bfb047973a8c3dddea961351fb00561cd102bdaf27558c3379516f27bd97d8196d2dd691bfca4c41c5801db4ae75eef5905219074b26c1f2db093952731cd03cb04a452b6615f501b4ad6acf88a32710917f6c7dc65451b7a44742900494a41047e13df63c904c684a687d731196c2fcd927e667de28ca493ce2a72dc3c61750afad1396c54b32d52aa7a0b5cccea24b917351ec2ef63b640f7ddb3f69b99ac56fecce8cbcc579f5666f26d04a92a08a3da91699580081271e7da82817d400ea4c1e52f1b53a96ddc", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) recvmsg$kcm(r0, &(0x7f0000000dc0)={&(0x7f0000000740)=@hci, 0x80, &(0x7f0000000d00)=[{&(0x7f00000007c0)=""/161, 0xa1}, {&(0x7f0000000880)=""/81, 0x51}, {&(0x7f0000000900)=""/93, 0x5d}, {&(0x7f0000000980)=""/143, 0x8f}, {&(0x7f0000000a40)=""/118, 0x76}, {&(0x7f0000000ac0)=""/161, 0xa1}, {&(0x7f0000000b80)=""/141, 0x8d}, {&(0x7f0000000c40)=""/179, 0xb3}], 0x8, &(0x7f0000000d80)=""/26, 0x1a}, 0x120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:58:20 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@permit_directio}]}) mount$bpf(0x0, &(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:20 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:20 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2676.042468][T19861] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2676.076182][T19861] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2676.365854][T19897] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 2676.375364][T19897] netlink: 'syz-executor.5': attribute type 9 has an invalid length. [ 2676.396556][T19897] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.5'. 20:58:21 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc25108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:58:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}]}) mount$bpf(0x0, &(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:21 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, &(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:21 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2676.420725][T19909] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 2676.449910][T19909] netlink: 'syz-executor.5': attribute type 9 has an invalid length. [ 2676.503576][T19909] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2676.549506][T19912] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2676.827569][T19912] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:58:22 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x2}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:58:22 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, &(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:22 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:22 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, &(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2678.476320][T19931] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2678.496222][T19931] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2678.700273][T19969] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2678.711903][T19969] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. 20:58:23 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb3f06f5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x41000, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000e00)={&(0x7f00000007c0)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000840)="c14e25e40cff7983e09cebd9fd35f678ceef3bccd5c102b08eeab18f7c9e864809e09a63ed03c128c5e659868ea798d227ee78e37df370ad1b3b0a495f9e5f14173c73d0fe161b27974371e9e77c63c4027b80bf67c209cce8bb68abafd46ea9fd2158cc714ca0cabec24aed9c9f0c2aea326be2bc91342771a3d9b55a9885b89fb89bc360fcc5161232f2e026c0137627c1a3d85236c49329cd297bc32dec0f45c03c56cc0eb8266c69a8e079ee90fb0924feeddd176834300e57249092784915e1a150423b3531e34c689b8c180dcaf1fd81a54738de8902fe7e9a6a0319f0f3e8a41db5a963f769877eda429aaa324259400e1ff0", 0xf6}, {&(0x7f0000000940)="8c27ef546f5505994395c92605824b5d6aab85e9272ca001969cbc07c2021a2ac477dc624ac5933487308f38614efb8cdb2feb", 0x33}, {&(0x7f0000000980)="8d2530f4ae7d48feef4bd469411102466350e96c032d7ede8e4d9fb2c090a04cd8216e5fea99f2d554e856cdaefbcf7b46a2a81d1dabe6233fdceae267665145f4fdcb3634ca32f9d1b957df7b9c0ef63d229439e5d8b706712187c46e05243910d6b3c132aca79aa6d2652d805b5660fb94624a45b4634107ad61089c7699e2bf2f91eb4aa0028bea09f1b988dc536128", 0x91}, {&(0x7f0000001900)="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", 0x1000}, {&(0x7f0000000a40)="52b3a1555b11462a8b8328e2d01694c1e1616f6a1b5b984dfc8fe5396fb2df6ec11bf027a7a0512ceb2c909c162f1a0e0ee0ac9fbda0ec12618898df15b734a6530cb94898c0ead9a1cebc54901614bf7194fcb56be9370697177edfb54f2ca4ce0865cfe88838ad94a5041f6cbb3928af5c41efe41a298fe1885e6c6224b405c0ffe2f1a31cc7bcb5442e2f99c83842f32416efff0551b86c9ae29677837d2ffb5b119a696fdb5ff0f78265f97c6bf6e522f97330e13c95cc3829bff21cbb8ec0437c54431c518c0f6d076892c088ccb01c0fddb06ed05153197b0b1699a4", 0xdf}, {&(0x7f0000000b40)="784526da3a55ed1801385460c0839a62169ad7b5f2e4e826ae2c02f2361a357f0b98499758bb97bab697234d3e64ac00d1c5fa7c029ef22127f32b1cfd097974b256732c9d2baade8c1a2e53aa6c7cd9f539956474e38098bb1b92b7f8b0", 0x5e}], 0x6, &(0x7f0000000c40)=[{0xb8, 0x111, 0x67f, "28b2bbb0a367eb8f472d72d2f49cbd7096727adda9ca79ed0f60d638e6a60b3d9e65f55c0e58c3c94b52c960718b16a84153f5d295fefa4cb9d364368231a7075f47fb994f3182bac52ea476741856e126ece874f46ef600677af8832a8de85edb099ed4bf828091a78171a0752b1c7485a576027c7968990c1a597b06d738df65b1480bf9d3048bd206f463ea61091535227282b6b111ec445c1fb543652070bc2c"}, {0xf0, 0x112, 0x2, "ed21e48a6dca66f6a0a776812ca16843a1e98af3f494d401de6c5aa602e03e1d593e162fdcae859fc0788b01db2b8c2b52b4de536b18d94187ab3566ba855b2fd5539609e7b47cefe5c8e7ab3d011575b92e2e4bda22716ff29034e3b98299ed9a9e25ff55c90817c1e99176136f1043e9895e9fd205dc95384218767cf59945eac515cc588f8c9dfc5f85aff5dbeee08f8c9a2489eef3b27382105cd551b37aeeb6d8fa14198f935a390b24898183358c89d8c77522a2535d2c758e17e55aaed35731b76740d9865df7301437aca0de5bae54cbd0c7955a1da5084a226b"}], 0x1a8}, 0x40090) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:58:23 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x0, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:23 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, 0x0, &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, &(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:23 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, &(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2679.795154][T19978] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 2679.818989][T19978] netlink: 'syz-executor.5': attribute type 9 has an invalid length. [ 2679.831635][T19978] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2679.874066][T19994] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2679.889460][T19994] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2680.146858][T20000] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 2680.155068][T20000] netlink: 'syz-executor.5': attribute type 9 has an invalid length. [ 2680.167571][T20000] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2680.178528][T20034] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2680.190598][T20034] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. 20:58:25 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc6c108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:58:25 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x0, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:25 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, 0x0, &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, &(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:25 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, &(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:25 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x3}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) 20:58:26 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x0, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:26 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c35"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, &(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:26 executing program 4 (fault-call:17 fault-nth:0): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2681.556773][T20038] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2681.585189][T20038] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2681.600242][T20114] FAULT_INJECTION: forcing a failure. [ 2681.600242][T20114] name failslab, interval 1, probability 0, space 0, times 0 [ 2681.600278][T20114] CPU: 1 PID: 20114 Comm: syz-executor.4 Not tainted 5.14.0-rc5-syzkaller #0 [ 2681.600306][T20114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2681.600323][T20114] Call Trace: [ 2681.600341][T20114] dump_stack_lvl+0xcd/0x134 [ 2681.600377][T20114] should_fail.cold+0x5/0xa [ 2681.600408][T20114] should_failslab+0x5/0x10 [ 2681.600435][T20114] __kmalloc_track_caller+0x79/0x420 [ 2681.600464][T20114] ? strndup_user+0x70/0xe0 [ 2681.600573][T20114] memdup_user+0x22/0xd0 [ 2681.600601][T20114] strndup_user+0x70/0xe0 [ 2681.600630][T20114] __x64_sys_mount+0x134/0x300 [ 2681.600655][T20114] ? copy_mnt_ns+0xae0/0xae0 [ 2681.600681][T20114] ? syscall_enter_from_user_mode+0x21/0x70 [ 2681.600717][T20114] do_syscall_64+0x35/0xb0 [ 2681.600740][T20114] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2681.600771][T20114] RIP: 0033:0x4665e9 [ 2681.600790][T20114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2681.600814][T20114] RSP: 002b:00007fd01df25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2681.600842][T20114] RAX: ffffffffffffffda RBX: 000000000056c1a8 RCX: 00000000004665e9 [ 2681.600859][T20114] RDX: 0000000020000380 RSI: 00000000200000c0 RDI: 0000000020000000 [ 2681.600875][T20114] RBP: 00007fd01df251d0 R08: 0000000020000100 R09: 0000000000000000 [ 2681.600892][T20114] R10: 0000000000005890 R11: 0000000000000246 R12: 0000000000000001 [ 2681.600907][T20114] R13: 00007ffc150d47df R14: 00007fd01df25300 R15: 0000000000022000 [ 2682.106368][T20081] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 2682.119014][T20081] netlink: 'syz-executor.5': attribute type 9 has an invalid length. [ 2682.129021][T20081] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2682.140506][T20085] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 20:58:27 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="8a53ba324e04", 0x6}, {&(0x7f0000000280)="14ac9d18b9897f1faba40ef1608e40a7658e1811e60218d1ad98b06baf2f9ebbf51fda65c913628d741c4c6007ff6c", 0x2f}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f0000000480)="3af7595f3db8f9e009510491c5e769afafebeab98d0e865b27d02f531768e55eab0a07459566741d6557220c91d1318861c4beff94c7f9b48112e34bf4ee5566acbddce35454204eccffeaeaeded35645f333907a440ac588342dd9ca8710d15177e1881c590303732e4a7c4d3eb4413d617b2cdd450875cf30aacf924fbda8b48a101763a817ed71630f88f79f54360337a37f0e3f6deb43731b48c7d6f0d25b6af3d4e3abd8b06071da11b", 0xac}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="70000010000500000001000060000000a1d888cb196cf78bf6012cd91df50c86521c08a79f6badd964e6bec401bb66c7085769ad036e91eb4f5ef5dd3c3ded21145a629ffda7cb07e47da963dcf30b9ce4add0be9cd1436526713b3a00003fcf31f20379aaa73e4bf3c7679a6c198edd"], 0x70}, 0x95) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)="c95a5817c9ad673e96d8dd3d42b955615b5f5d774a3771e8171d2ff86a140a48d1dee20ac74cec8c350d91cadf1a5736a3c4f6ed9cb2e45eff1bc200227ebbbdb09096d6306bfd4f54a5d8acd0d1ec2d1768f04963cbe6babb074b4ccc9d7019bc3bd902d100268f0293c38784983a633b5fe792d813855c50c1d56ec3550910c899953292a64ec8220171430647b0f78198883da534da72551fab9b570a970b7bc09b5800add0c933fb46c85252fb5477d14afa6e39efff4c1ed71984eeed1d4055de95d01c5d9de7df21c17b67000c126a7257951ec6992a5918f2c11e86a109ed46c23d40dae1f11daa7b55e87477aba68204c9e9", 0xf6}], 0x1, &(0x7f0000000880)=[{0x30, 0x116, 0x7, "1f6f256aa286239442f69017026bf576cc9c6f236aba104177495d13d1673398"}, {0xe0, 0xff, 0x6, "70086d3332e7f73fe9be6f43e61e7d0f3b3a0c7908e567aac9e98934ee3a70e0b34e9aaad1742144fad2f3effc1b59d9723a2fcf01f2e33df8a0e7982761f24facdb8e73fa5209de8085c54f7b1ec463af2465b5f03e3afef1edc6e4fbf63b2848b138e51b2f9e1947233eaeebe91c81075d26b1b0c6d418c8a64a65e5548e55d9a484a519e69baecab5e78a1c8dbddbc2633e3e002fe9cc741685388e374e967a883308066aabed5fa9fa9a4765d0b75755e19b9e0496e08311780cac6974c712d1018fc0c641d656d06d"}, {0x48, 0x84, 0x4, "7e4a7aec8b761e31550d20b6532d7d7555d786b0fef1007d53a979a230f65e1a49429c63057e8760188b99b4e4cf712210911b25"}, {0x60, 0x221, 0x8, "509d03362ed0453a9c0132788f8a9ee63d491742aa18f402e93eceab3968cccd395e132fd3958f2c793d1aaee1b705c820cb0659f5ad6c55041955cb0dbbd3e146fddfbae6c82aacdedbec"}, {0xe0, 0x10f, 0x0, "7cf2600a169678e38698baee6d34758ea1f92a9ffe826251b132212bc5f360c07f1bb89bd459b87a4ea4115516269f9e259308fd51d066460efcfaa3a08a50cd9e38fc513c28cbfc0b8b6b18684ed67924dbaacbbbf66798b848c17e5e1e4cc22a19c6eea620046982f47b22002ae37b4e2eed846aecd794f54bdafb0dd393835b0a25f4e44de6d1213fcf107aaf4360d072de6162fd2fd79f52daa92056eebdb8e54dd2f50790874f1ecfc50045523c1d5b9fcd534b01107654209683e04cf3665a0c279d1b15ad32"}], 0x298}, 0x8000) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60108202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:58:27 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775"}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:27 executing program 4 (fault-call:17 fault-nth:1): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:27 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c35"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, &(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) [ 2682.154575][T20085] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2682.694381][T20147] FAULT_INJECTION: forcing a failure. [ 2682.694381][T20147] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2682.810471][T20147] CPU: 0 PID: 20147 Comm: syz-executor.4 Not tainted 5.14.0-rc5-syzkaller #0 [ 2682.819287][T20147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2682.829566][T20147] Call Trace: [ 2682.832864][T20147] dump_stack_lvl+0xcd/0x134 [ 2682.837581][T20147] should_fail.cold+0x5/0xa [ 2682.842124][T20147] _copy_from_user+0x2c/0x180 [ 2682.846844][T20147] memdup_user+0x65/0xd0 [ 2682.851123][T20147] strndup_user+0x70/0xe0 [ 2682.855526][T20147] __x64_sys_mount+0x134/0x300 [ 2682.860584][T20147] ? copy_mnt_ns+0xae0/0xae0 [ 2682.865218][T20147] ? syscall_enter_from_user_mode+0x21/0x70 [ 2682.871329][T20147] do_syscall_64+0x35/0xb0 [ 2682.875818][T20147] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2682.881757][T20147] RIP: 0033:0x4665e9 [ 2682.885676][T20147] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2682.905838][T20147] RSP: 002b:00007fd01df25188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2682.914284][T20147] RAX: ffffffffffffffda RBX: 000000000056c1a8 RCX: 00000000004665e9 [ 2682.922259][T20147] RDX: 0000000020000380 RSI: 00000000200000c0 RDI: 0000000020000000 [ 2682.930232][T20147] RBP: 00007fd01df251d0 R08: 0000000020000100 R09: 0000000000000000 [ 2682.938206][T20147] R10: 0000000000005890 R11: 0000000000000246 R12: 0000000000000001 [ 2682.946445][T20147] R13: 00007ffc150d47df R14: 00007fd01df25300 R15: 0000000000022000 [ 2683.247107][T20100] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 2683.272884][T20100] netlink: 'syz-executor.5': attribute type 9 has an invalid length. [ 2683.293278][T20100] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2683.308356][T20105] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2683.324873][T20105] netlink: 179644 bytes leftover after parsing attributes in process `syz-executor.0'. 20:58:28 executing program 0: socket$kcm(0x29, 0x7, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4004000) sendmsg(0xffffffffffffffff, 0x0, 0x24020005) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x9, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x1, 0xc, 0xb, 0x2, 0xffffffffffffffff}, @map, @map={0x18, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @exit], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x91, &(0x7f0000000380)=""/145, 0x41000, 0x10, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x1e, 0x2, &(0x7f00000018c0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f0000000600)='syzkaller\x00', 0x4, 0xcb, &(0x7f0000001740)=""/203, 0x40f00, 0x14, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x1, 0x2}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029005b05d25a80308c63940d0424fc60028202400a080a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1a0}, 0x80) 20:58:28 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c35"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, &(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:28 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775"}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31, 0x65], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:28 executing program 4 (fault-call:17 fault-nth:2): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x1) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x170) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000340)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, &(0x7f0000000dc0)=ANY=[@ANYBLOB="a8e8829a995e13db578c10fd07f1b5381a91ff0f61b544fdf227adb32365343111c1f937b1a4b46929d198ef7d0d6c1c6f6cc99f842c38c7ef7d422d1865b4dd7a3bf139c18d1e0a514fb875bc6bd14261c872b30cf7d37c625d4c44b5b32ac863d58c54356bf0b1e32732dcba2ffa48d8417c608088d9c00fff67bd65f17a5d796217a96dddc84a08ea613593df0badd9d801ebfc3f13603408b865fce590c8879a04e7284c6343757fe6e1a05926474a7bdd07445f4d6e64cfb31a5679fba8465aaaffef8f83553e12977503b6dda1389c5ff598316f2de86cb713864cfc48d311b00e27614261c59bcab96879e3834c3519"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5e4}}], [{@euid_gt}, {@permit_directio}]}) mount$bpf(0x0, 0x0, &(0x7f0000000640), 0x3100082, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xffffffffee72ecb2}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x280000000000000}}], [{@measure}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000900)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x0, "964323f47775", 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ce30", 0x2}], 0x1}, 0x50) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, &(0x7f0000000980)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="686a423a5d852e12a407fde6d84cdb9a993d4c26492579c4c9f2e5fb1efde0bd2e12adc6588211e592aaaa3b037e19dd52a5f9e90091cf1b545a97b365cd95380bbaf7bf230cae032d5af1d50d7614617d9429acf7d6b5c9715cc9ac99dd8d2a989513afa6e199848118d2a043b86d962ba7d8e58677f36df56244ac5d98b69f5c6c258b85a55a386c959103b5d2c9c26638382898355efaf65b86b78de531bbe60875a0717dc7eb1b355596d9b63063143eeefb0c20a8f3d71a96c6bed875d9df724381e6c74657de6254", @ANYRESOCT, @ANYRESOCT, @ANYRESDEC]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000380), 0x5890, &(0x7f0000000100)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000000880)=""/67, 0x43}], 0x4, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) mount$bpf(0x0, &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740), 0x10000, &(0x7f0000000c00)={[{@mode={'mode', 0x3d, 0x3}}, {}, {}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x5792}}, {@mode={'mode', 0x3d, 0x400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x36, 0x39, 0x63, 0x31], 0x2d, [0x61, 0x0, 0x30, 0x2843b58d00c2911f], 0x2d, [0x61, 0x37, 0x38, 0x63], 0x2d, [0x38, 0x35, 0x30], 0x2d, [0x62, 0x37, 0xb091cfef430a6a5c, 0x33, 0x32, 0x62, 0x61, 0x65]}}}, {@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'euid>'}}, {@appraise}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) 20:58:28 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0xa, 0x0, 0x11) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3800, 0x882}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030031000505d25a80648c63940d0424fc6010000b4031000000053582c137153e370248098000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x4}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) [ 2683.590977][T20139] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2684.062640][T20198] FAULT_INJECTION: forcing a failure. [ 2684.062640][T20198] name failslab, interval 1, probability 0, space 0, times 0 [ 2788.956993][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 2788.963636][ C0] rcu: 0-...!: (10490 ticks this GP) idle=afe/1/0x4000000000000000 softirq=254313/254319 fqs=17 [ 2788.975356][ C0] (t=10501 jiffies g=488777 q=44) [ 2788.980495][ C0] rcu: rcu_preempt kthread starved for 10467 jiffies! g488777 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 2788.991971][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 2789.002043][ C0] rcu: RCU grace-period kthread stack dump: [ 2789.007931][ C0] task:rcu_preempt state:R running task stack:28272 pid: 14 ppid: 2 flags:0x00004000 [ 2789.019172][ C0] Call Trace: [ 2789.022476][ C0] __schedule+0x93a/0x26f0 [ 2789.026922][ C0] ? io_schedule_timeout+0x140/0x140 [ 2789.032224][ C0] ? debug_object_destroy+0x210/0x210 [ 2789.037617][ C0] schedule+0xd3/0x270 [ 2789.041704][ C0] schedule_timeout+0x14a/0x2a0 [ 2789.046571][ C0] ? usleep_range+0x170/0x170 [ 2789.051266][ C0] ? destroy_timer_on_stack+0x20/0x20 [ 2789.056767][ C0] ? rnbd_clt_map_device.cold+0x764/0x832 [ 2789.062546][ C0] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 2789.068369][ C0] ? prepare_to_swait_event+0xee/0x470 [ 2789.073847][ C0] rcu_gp_kthread+0xd34/0x1980 [ 2789.078703][ C0] ? print_cpu_stall_info+0x6b0/0x6b0 [ 2789.084182][ C0] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2789.090439][ C0] ? __kthread_parkme+0x15f/0x220 [ 2789.095529][ C0] ? print_cpu_stall_info+0x6b0/0x6b0 [ 2789.100918][ C0] kthread+0x3e5/0x4d0 [ 2789.105001][ C0] ? set_kthread_struct+0x130/0x130 [ 2789.110220][ C0] ret_from_fork+0x1f/0x30 [ 2789.114723][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 2789.121044][ C0] Sending NMI from CPU 0 to CPUs 1: [ 2789.127623][ C1] NMI backtrace for cpu 1 [ 2789.127633][ C1] CPU: 1 PID: 20187 Comm: syz-executor.4 Not tainted 5.14.0-rc5-syzkaller #0 [ 2789.127644][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2789.127654][ C1] RIP: 0010:kasan_check_range+0x17/0x180 [ 2789.127666][ C1] Code: 0f 1f 00 48 89 f2 be f8 00 00 00 e9 b3 b9 39 02 0f 1f 00 48 85 f6 0f 84 70 01 00 00 49 89 f9 41 54 44 0f b6 c2 49 01 f1 55 53 <0f> 82 18 01 00 00 48 b8 ff ff ff ff ff 7f ff ff 48 39 c7 0f 86 05 [ 2789.127683][ C1] RSP: 0018:ffffc90000dc0bf0 EFLAGS: 00000082 [ 2789.127696][ C1] RAX: 0000000000000000 RBX: 1ffff920001b8184 RCX: ffffffff815b2b48 [ 2789.127706][ C1] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff8d6c9050 [ 2789.127716][ C1] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffff8d6c9058 [ 2789.127726][ C1] R10: ffffffff81656b0d R11: 0000000000000000 R12: 0000000000000000 [ 2789.127735][ C1] R13: 0000000000000000 R14: ffffffff90486728 R15: 0000000000000000 [ 2789.127745][ C1] FS: 00007fd01df88700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 2789.127755][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2789.127763][ C1] CR2: 00005617c14f7000 CR3: 000000007fe91000 CR4: 00000000001506e0 [ 2789.127773][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2789.127783][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2789.127791][ C1] Call Trace: [ 2789.127795][ C1] [ 2789.127800][ C1] lock_acquire+0xb8/0x510 [ 2789.127807][ C1] ? lock_release+0x720/0x720 [ 2789.127813][ C1] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2789.127821][ C1] _raw_spin_lock_irqsave+0x39/0x50 [ 2789.127827][ C1] ? debug_object_activate+0x12e/0x3e0 [ 2789.127835][ C1] debug_object_activate+0x12e/0x3e0 [ 2789.127841][ C1] ? debug_object_assert_init+0x2e0/0x2e0 [ 2789.127849][ C1] ? lock_release+0x720/0x720 [ 2789.127855][ C1] ? do_raw_spin_lock+0x120/0x2b0 [ 2789.127862][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 2789.127869][ C1] enqueue_hrtimer+0x27/0x3e0 [ 2789.127875][ C1] __hrtimer_run_queues+0xb02/0xe50 [ 2789.127882][ C1] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 2789.127890][ C1] ? ktime_get_update_offsets_now+0x3eb/0x5c0 [ 2789.127898][ C1] hrtimer_interrupt+0x330/0xa00 [ 2789.127905][ C1] __sysvec_apic_timer_interrupt+0x146/0x530 [ 2789.127912][ C1] sysvec_apic_timer_interrupt+0x8e/0xc0 [ 2789.127919][ C1] [ 2789.127924][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2789.127932][ C1] RIP: 0010:__pv_queued_spin_lock_slowpath+0x3ba/0xb40 [ 2789.127946][ C1] Code: eb c6 45 01 01 41 bc 00 80 00 00 48 c1 e9 03 83 e3 07 41 be 01 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8d 2c 01 eb 0c f3 90 <41> 83 ec 01 0f 84 72 04 00 00 41 0f b6 45 00 38 d8 7f 08 84 c0 0f [ 2789.127962][ C1] RSP: 0018:ffffc90003857288 EFLAGS: 00000206 [ 2789.127974][ C1] RAX: 0000000000000003 RBX: 0000000000000000 RCX: 1ffff11029093600 [ 2789.127984][ C1] RDX: 0000000000000001 RSI: ffffffff817bd271 RDI: ffffffff81332591 [ 2789.127993][ C1] RBP: ffff88814849b000 R08: 0000000000000001 R09: 0000000000000001 [ 2789.128003][ C1] R10: ffffffff817bd239 R11: 0000000000000000 R12: 0000000000001664 [ 2789.128012][ C1] R13: ffffed1029093600 R14: 0000000000000001 R15: ffff8880b9d527c0 [ 2789.128021][ C1] ? trace_hardirqs_on+0x19/0x1c0 [ 2789.128028][ C1] ? trace_hardirqs_on+0x51/0x1c0 [ 2789.128034][ C1] ? kvm_wait+0x51/0xf0 [ 2789.128040][ C1] ? __pv_queued_spin_lock_slowpath+0x8b8/0xb40 [ 2789.128048][ C1] ? pv_hash+0x100/0x100 [ 2789.128054][ C1] ? lock_release+0x720/0x720 [ 2789.128060][ C1] do_raw_spin_lock+0x200/0x2b0 [ 2789.128067][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 2789.128074][ C1] ext4_mb_regular_allocator+0x1977/0x3870 [ 2789.128081][ C1] ? ext4_mb_prefetch_fini+0xa80/0xa80 [ 2789.128088][ C1] ? lockdep_hardirqs_on+0x79/0x100 [ 2789.128095][ C1] ext4_mb_new_blocks+0x24d4/0x5230 [ 2789.128102][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2789.128110][ C1] ? ext4_ext_map_blocks+0x1bfc/0x6070 [ 2789.128117][ C1] ? ext4_discard_preallocations+0xee0/0xee0 [ 2789.128125][ C1] ? ext4_inode_to_goal_block+0x5e/0x440 [ 2789.128132][ C1] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 2789.128140][ C1] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2789.128148][ C1] ? ext4_inode_to_goal_block+0x340/0x440 [ 2789.128155][ C1] ext4_ext_map_blocks+0x1fa3/0x6070 [ 2789.128162][ C1] ? lockdep_hardirqs_on+0x79/0x100 [ 2789.128169][ C1] ? lock_chain_count+0x20/0x20 [ 2789.128175][ C1] ? ext4_ext_release+0x10/0x10 [ 2789.128186][ C1] ? lock_acquire+0x1ef/0x510 [ 2789.128192][ C1] ? mark_held_locks+0x9f/0xe0 [ 2789.128199][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2789.128207][ C1] ? lockdep_hardirqs_on+0x79/0x100 [ 2789.128213][ C1] ? ext4_map_blocks+0x5fd/0x17d0 [ 2789.128220][ C1] ext4_map_blocks+0x653/0x17d0 [ 2789.128227][ C1] ? ext4_issue_zeroout+0x1f0/0x1f0 [ 2789.128233][ C1] ? mark_lock+0xef/0x17b0 [ 2789.128239][ C1] ? mark_lock+0xef/0x17b0 [ 2789.128245][ C1] ext4_getblk+0x13c/0x680 [ 2789.128252][ C1] ? ext4_iomap_overwrite_begin+0xa0/0xa0 [ 2789.128259][ C1] ext4_bread+0x2a/0x1c0 [ 2789.128265][ C1] ext4_append+0x177/0x390 [ 2789.128270][ C1] ext4_init_new_dir+0x33f/0x5e0 [ 2789.128277][ C1] ? ext4_init_dot_dotdot+0x600/0x600 [ 2789.128283][ C1] ? ext4_mkdir+0x36d/0xb20 [ 2789.128288][ C1] ext4_mkdir+0x3cf/0xb20 [ 2789.128293][ C1] ? ext4_rmdir+0xf10/0xf10 [ 2789.128298][ C1] vfs_mkdir+0x52e/0x760 [ 2789.128303][ C1] do_mkdirat+0x284/0x310 [ 2789.128308][ C1] ? user_path_create+0xf0/0xf0 [ 2789.128314][ C1] ? syscall_enter_from_user_mode+0x21/0x70 [ 2789.128320][ C1] do_syscall_64+0x35/0xb0 [ 2789.128325][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2789.128331][ C1] RIP: 0033:0x4665e9 [ 2789.128340][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2789.128355][ C1] RSP: 002b:00007fd01df88188 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2789.128368][ C1] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2789.128377][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 2789.128385][ C1] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 2789.128394][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 2789.128402][ C1] R13: 00007ffc150d47df R14: 00007fd01df88300 R15: 0000000000022000 [ 2789.128419][ C0] NMI backtrace for cpu 0 [ 2789.756130][ C0] CPU: 0 PID: 20183 Comm: syz-executor.2 Not tainted 5.14.0-rc5-syzkaller #0 [ 2789.764951][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2789.775114][ C0] Call Trace: [ 2789.778406][ C0] [ 2789.781257][ C0] dump_stack_lvl+0xcd/0x134 [ 2789.785879][ C0] nmi_cpu_backtrace.cold+0x44/0xd7 [ 2789.791096][ C0] ? lapic_can_unplug_cpu+0x80/0x80 [ 2789.796327][ C0] nmi_trigger_cpumask_backtrace+0x1b3/0x230 [ 2789.802347][ C0] rcu_dump_cpu_stacks+0x25e/0x3f0 [ 2789.807504][ C0] rcu_sched_clock_irq.cold+0x9f/0x747 [ 2789.813316][ C0] ? find_held_lock+0x2d/0x110 [ 2789.818929][ C0] ? rcutree_dead_cpu+0x50/0x50 [ 2789.823804][ C0] ? tick_sched_timer+0x2b/0x2d0 [ 2789.828837][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 2789.833723][ C0] update_process_times+0x16d/0x200 [ 2789.838945][ C0] tick_sched_handle+0x9b/0x180 [ 2789.843812][ C0] tick_sched_timer+0x1b0/0x2d0 [ 2789.848707][ C0] ? get_cpu_iowait_time_us+0x3f0/0x3f0 [ 2789.854705][ C0] __hrtimer_run_queues+0x1c0/0xe50 [ 2789.859933][ C0] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 2789.865934][ C0] ? ktime_get_update_offsets_now+0x3eb/0x5c0 [ 2789.872029][ C0] hrtimer_interrupt+0x330/0xa00 [ 2789.877003][ C0] __sysvec_apic_timer_interrupt+0x146/0x530 [ 2789.883004][ C0] sysvec_apic_timer_interrupt+0x40/0xc0 [ 2789.888666][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2789.894906][ C0] RIP: 0010:unwind_next_frame+0x13d1/0x1ce0 [ 2789.900851][ C0] Code: f6 40 0f 95 c6 41 84 f1 0f 85 6d 04 00 00 83 e0 07 38 c1 40 0f 9e c6 84 c9 0f 95 c0 40 84 c6 0f 85 56 04 00 00 49 0f bf 70 02 <4d> 8d 7e 34 4c 89 f7 4c 01 e6 e8 d0 ea ff ff 84 c0 0f 85 ac fa ff [ 2789.920493][ C0] RSP: 0018:ffffc90000007740 EFLAGS: 00000246 [ 2789.926578][ C0] RAX: 0000000000000000 RBX: 1ffff92000000ef0 RCX: 0000000000000000 [ 2789.934558][ C0] RDX: ffffc90000007858 RSI: ffffffffffffffd0 RDI: ffffffff8deab1ac [ 2789.942537][ C0] RBP: 0000000000000002 R08: ffffffff8deab1aa R09: 0000000000000001 [ 2789.950518][ C0] R10: fffff52000000f0e R11: 0000000000086088 R12: ffffc90000007f30 [ 2789.958587][ C0] R13: ffffc9000000784d R14: ffffc90000007818 R15: ffffffff8deab1ae [ 2789.966595][ C0] ? __hrtimer_run_queues+0x609/0xe50 [ 2789.972000][ C0] ? deref_stack_reg+0x150/0x150 [ 2789.976963][ C0] ? create_prof_cpu_mask+0x20/0x20 [ 2789.982180][ C0] arch_stack_walk+0x7d/0xe0 [ 2789.986830][ C0] ? hrtimer_run_softirq+0x17b/0x360 [ 2789.992136][ C0] ? kfree+0xe4/0x530 [ 2789.996131][ C0] stack_trace_save+0x8c/0xc0 [ 2790.000821][ C0] ? stack_trace_consume_entry+0x160/0x160 [ 2790.006644][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2790.012941][ C0] kasan_save_stack+0x1b/0x40 [ 2790.017658][ C0] ? kasan_save_stack+0x1b/0x40 [ 2790.022556][ C0] ? kasan_set_track+0x1c/0x30 [ 2790.027352][ C0] ? kasan_set_free_info+0x20/0x30 [ 2790.032484][ C0] ? __kasan_slab_free+0xfb/0x130 [ 2790.037528][ C0] ? slab_free_freelist_hook+0xdf/0x240 [ 2790.043088][ C0] ? kfree+0xe4/0x530 [ 2790.047084][ C0] ? skb_release_data+0x65a/0x790 [ 2790.052141][ C0] ? consume_skb+0xc2/0x160 [ 2790.056661][ C0] ? mac80211_hwsim_tx_frame+0x1f6/0x2a0 [ 2790.062409][ C0] ? mac80211_hwsim_beacon_tx+0x49b/0x930 [ 2790.068141][ C0] ? __iterate_interfaces+0x1e5/0x520 [ 2790.073609][ C0] ? ieee80211_iterate_active_interfaces_atomic+0x70/0x180 [ 2790.080981][ C0] ? mac80211_hwsim_beacon+0xd5/0x1a0 [ 2790.086388][ C0] ? __hrtimer_run_queues+0x609/0xe50 [ 2790.091797][ C0] ? mark_held_locks+0x9f/0xe0 [ 2790.096594][ C0] ? irqtime_account_irq+0x187/0x2d0 [ 2790.101905][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2790.108533][ C0] ? lockdep_hardirqs_on+0x79/0x100 [ 2790.113746][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2790.119950][ C0] ? _raw_spin_unlock_irqrestore+0x38/0x70 [ 2790.125776][ C0] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 2790.131608][ C0] ? debug_check_no_obj_freed+0x20c/0x420 [ 2790.137345][ C0] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2790.143604][ C0] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2790.149866][ C0] kasan_set_track+0x1c/0x30 [ 2790.154474][ C0] kasan_set_free_info+0x20/0x30 [ 2790.159427][ C0] __kasan_slab_free+0xfb/0x130 [ 2790.164299][ C0] slab_free_freelist_hook+0xdf/0x240 [ 2790.169691][ C0] kfree+0xe4/0x530 [ 2790.173508][ C0] ? skb_release_data+0x65a/0x790 [ 2790.178549][ C0] ? skb_release_data+0x60e/0x790 [ 2790.183614][ C0] skb_release_data+0x65a/0x790 [ 2790.188494][ C0] ? skb_release_head_state+0x10c/0x280 [ 2790.194081][ C0] consume_skb+0xc2/0x160 [ 2790.198443][ C0] mac80211_hwsim_tx_frame+0x1f6/0x2a0 [ 2790.203936][ C0] mac80211_hwsim_beacon_tx+0x49b/0x930 [ 2790.209506][ C0] __iterate_interfaces+0x1e5/0x520 [ 2790.214730][ C0] ? mac80211_hwsim_tx_frame+0x2a0/0x2a0 [ 2790.220382][ C0] ? mac80211_hwsim_tx_frame+0x2a0/0x2a0 [ 2790.226030][ C0] ? mac80211_hwsim_addr_match+0x180/0x180 [ 2790.231850][ C0] ieee80211_iterate_active_interfaces_atomic+0x70/0x180 [ 2790.238903][ C0] mac80211_hwsim_beacon+0xd5/0x1a0 [ 2790.244207][ C0] __hrtimer_run_queues+0x609/0xe50 [ 2790.249532][ C0] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 2790.255536][ C0] ? ktime_get_update_offsets_now+0x3eb/0x5c0 [ 2790.261747][ C0] hrtimer_run_softirq+0x17b/0x360 [ 2790.266973][ C0] __do_softirq+0x29b/0x9c2 [ 2790.271506][ C0] __irq_exit_rcu+0x16e/0x1c0 [ 2790.276571][ C0] irq_exit_rcu+0x5/0x20 [ 2790.280835][ C0] sysvec_apic_timer_interrupt+0x93/0xc0 [ 2790.286571][ C0] [ 2790.289513][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2790.295521][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x60 [ 2790.301780][ C0] Code: 81 e1 00 01 00 00 65 48 8b 14 25 00 f0 01 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 34 15 00 00 85 c0 74 2b 8b 82 10 15 00 00 <83> f8 02 75 20 48 8b 8a 18 15 00 00 8b 92 14 15 00 00 48 8b 01 48 [ 2790.321438][ C0] RSP: 0018:ffffc90003827008 EFLAGS: 00000246 [ 2790.327792][ C0] RAX: 0000000000000002 RBX: ffffc90003827530 RCX: 0000000000000000 [ 2790.336031][ C0] RDX: ffff88801902d4c0 RSI: ffffffff8212e5f2 RDI: 0000000000000003 [ 2790.344011][ C0] RBP: 0000000000000002 R08: 0000000000000000 R09: 0000000000001301 [ 2790.351987][ C0] R10: ffffffff8212e5e5 R11: 0000000000000000 R12: ffffc900038270a0 [ 2790.359970][ C0] R13: 000000000000000c R14: ffffc90003827548 R15: ffff888021a74000 [ 2790.367964][ C0] ? mb_find_buddy+0xc5/0x380 [ 2790.372684][ C0] ? mb_find_buddy+0xd2/0x380 [ 2790.377461][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2790.383804][ C0] mb_find_buddy+0xd2/0x380 [ 2790.388326][ C0] mb_find_order_for_block+0x1c9/0x2d0 [ 2790.393914][ C0] ? mb_update_avg_fragment_size.isra.0+0x4a0/0x4a0 [ 2790.400519][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2790.406779][ C0] ? mb_find_buddy+0x209/0x380 [ 2790.411732][ C0] mb_mark_used+0x49c/0xdc0 [ 2790.416255][ C0] ? ext4_mb_discard_lg_preallocations+0xf30/0xf30 [ 2790.422786][ C0] ext4_mb_use_best_found+0x207/0x8e0 [ 2790.428170][ C0] ? mb_find_extent+0x2bb/0xc20 [ 2790.433066][ C0] ext4_mb_check_limits+0x3f4/0x490 [ 2790.438284][ C0] ? ext4_mb_scan_aligned+0x550/0x550 [ 2790.443675][ C0] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2790.449946][ C0] ? _find_next_bit+0x1e3/0x260 [ 2790.454843][ C0] ext4_mb_complex_scan_group+0x5a7/0x9e0 [ 2790.460674][ C0] ? ext4_mb_check_limits+0x490/0x490 [ 2790.466056][ C0] ? ext4_get_group_info+0x211/0x3d0 [ 2790.471453][ C0] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 2790.477187][ C0] ? ext4_mb_good_group+0x3d2/0x510 [ 2790.482402][ C0] ? ext4_mb_regular_allocator+0xd4d/0x3870 [ 2790.488313][ C0] ext4_mb_regular_allocator+0xdb0/0x3870 [ 2790.494132][ C0] ? lock_release+0x3f1/0x720 [ 2790.498840][ C0] ? ext4_mb_prefetch_fini+0xa80/0xa80 [ 2790.504344][ C0] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2790.509982][ C0] ? kmem_cache_alloc+0x371/0x4a0 [ 2790.515030][ C0] ext4_mb_new_blocks+0x24d4/0x5230 [ 2790.520346][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2790.526533][ C0] ? lockdep_hardirqs_on+0x79/0x100 [ 2790.531760][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2790.537954][ C0] ? ext4_discard_preallocations+0xee0/0xee0 [ 2790.543970][ C0] ? ext4_ext_map_blocks+0x1f6b/0x6070 [ 2790.549456][ C0] ext4_ext_map_blocks+0x1fa3/0x6070 [ 2790.554784][ C0] ? lockdep_hardirqs_on+0x79/0x100 [ 2790.560000][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2790.566183][ C0] ? ext4_ext_release+0x10/0x10 [ 2790.571047][ C0] ? lock_acquire+0x1ef/0x510 [ 2790.575742][ C0] ? lock_release+0x720/0x720 [ 2790.580452][ C0] ? down_write_killable_nested+0x180/0x180 [ 2790.586779][ C0] ? ext4_ext_map_blocks+0xab5/0x6070 [ 2790.592225][ C0] ext4_map_blocks+0x653/0x17d0 [ 2790.597112][ C0] ? ext4_issue_zeroout+0x1f0/0x1f0 [ 2790.602427][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2790.608608][ C0] ? mark_lock+0xef/0x17b0 [ 2790.613048][ C0] ext4_getblk+0x13c/0x680 [ 2790.617481][ C0] ? ext4_iomap_overwrite_begin+0xa0/0xa0 [ 2790.623274][ C0] ext4_bread+0x2a/0x1c0 [ 2790.627558][ C0] ext4_append+0x177/0x390 [ 2790.632002][ C0] ext4_init_new_dir+0x33f/0x5e0 [ 2790.636980][ C0] ? ext4_init_dot_dotdot+0x600/0x600 [ 2790.642455][ C0] ? ext4_mkdir+0x36d/0xb20 [ 2790.646986][ C0] ext4_mkdir+0x3cf/0xb20 [ 2790.651340][ C0] ? ext4_rmdir+0xf10/0xf10 [ 2790.655866][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2790.662226][ C0] vfs_mkdir+0x52e/0x760 [ 2790.666768][ C0] do_mkdirat+0x284/0x310 [ 2790.671127][ C0] ? user_path_create+0xf0/0xf0 [ 2790.675998][ C0] ? syscall_enter_from_user_mode+0x21/0x70 [ 2790.682005][ C0] do_syscall_64+0x35/0xb0 [ 2790.686438][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2790.692350][ C0] RIP: 0033:0x4665e9 [ 2790.697469][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2790.717098][ C0] RSP: 002b:00007fe3894d2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2790.725537][ C0] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2790.733520][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 2790.741503][ C0] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 2790.749486][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 2790.757485][ C0] R13: 00007ffe2f56ffcf R14: 00007fe3894d2300 R15: 0000000000022000