0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x0, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:14 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x4}}]}, 0x30}}, 0x0) 09:57:14 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'hsr0\x00', @link_local}) [ 719.365387][T27894] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 09:57:14 executing program 4: 09:57:14 executing program 3: [ 719.442325][T27905] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 719.473615][T27905] netlink: 4822 bytes leftover after parsing attributes in process `syz-executor.1'. [ 719.526191][T27912] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:14 executing program 3: 09:57:14 executing program 4: 09:57:14 executing program 3: 09:57:14 executing program 4: [ 719.776993][T27902] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 719.806439][T27902] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 720.252596][T27930] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:57:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc600d0016400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:15 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x4}}]}, 0x30}}, 0x0) 09:57:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x0, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:15 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'hsr0\x00', @link_local}) 09:57:15 executing program 3: 09:57:15 executing program 4: 09:57:15 executing program 4: 09:57:15 executing program 3: [ 720.496111][T27950] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 720.582751][T27962] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:15 executing program 3: 09:57:15 executing program 4: 09:57:15 executing program 3: 09:57:15 executing program 4: [ 720.992950][T27957] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 721.025954][T27957] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 721.308238][T27975] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 721.318842][T27975] __nla_validate_parse: 3 callbacks suppressed [ 721.318851][T27975] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc600e0016400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:16 executing program 3: 09:57:16 executing program 4: 09:57:16 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x4}}]}, 0x30}}, 0x0) 09:57:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x0, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:16 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'hsr0\x00', @link_local}) 09:57:16 executing program 3: [ 721.583205][T28000] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 721.612496][T28000] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:16 executing program 4: [ 721.693471][T28008] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:16 executing program 3: 09:57:16 executing program 4: 09:57:16 executing program 3: 09:57:16 executing program 4: [ 722.156496][T27999] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 722.245614][T28001] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 722.268393][T28001] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 722.501827][T28027] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 722.512383][T28027] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60110016400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:17 executing program 3: 09:57:17 executing program 4: 09:57:17 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x4}}]}, 0x30}}, 0x0) 09:57:17 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'hsr0\x00', @link_local}) 09:57:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x0, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:17 executing program 3: 09:57:17 executing program 4: [ 722.865348][T28057] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 722.893456][T28063] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 722.926214][T28057] netlink: 10242 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:17 executing program 3: 09:57:17 executing program 4: 09:57:18 executing program 3: 09:57:18 executing program 4: [ 723.290206][T28053] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 723.373170][T28055] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 723.403565][T28055] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 723.759194][T28079] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 723.767395][T28079] netlink: 10242 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60120016400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:18 executing program 3: 09:57:18 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x4}}]}, 0x30}}, 0x0) 09:57:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x0, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:18 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'hsr0\x00', @link_local}) 09:57:18 executing program 4: [ 724.153990][T28103] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 09:57:19 executing program 3: 09:57:19 executing program 4: [ 724.260165][T28111] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 724.326989][T28116] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 724.357024][T28111] netlink: 10242 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:19 executing program 3: 09:57:19 executing program 4: 09:57:19 executing program 3: 09:57:19 executing program 4: [ 724.987241][T28109] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 725.007692][T28109] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 725.198661][T28133] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 725.206856][T28133] netlink: 10242 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60140016400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:20 executing program 3: 09:57:20 executing program 4: 09:57:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:20 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x4}}]}, 0x30}}, 0x0) 09:57:20 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'hsr0\x00', @link_local}) 09:57:20 executing program 3: 09:57:20 executing program 4: [ 725.569734][T28160] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 725.642268][T28168] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:20 executing program 3: 09:57:20 executing program 4: 09:57:20 executing program 3: 09:57:20 executing program 4: [ 726.196667][T28161] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 726.220067][T28161] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 726.455732][T28185] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 726.469674][T28185] __nla_validate_parse: 2 callbacks suppressed [ 726.469683][T28185] netlink: 10242 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60280016400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:21 executing program 3: 09:57:21 executing program 4: 09:57:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:21 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x2, 0x0, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'hsr0\x00', @link_local}) 09:57:21 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x4}}]}, 0x30}}, 0x0) 09:57:21 executing program 3: [ 726.735530][T28207] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 09:57:21 executing program 4: [ 726.804277][T28213] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 726.896096][T28213] netlink: 10226 bytes leftover after parsing attributes in process `syz-executor.1'. [ 726.952060][T28225] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:21 executing program 3: 09:57:21 executing program 4: 09:57:22 executing program 3: 09:57:22 executing program 4: [ 727.681556][T28241] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 727.708864][T28241] netlink: 10226 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc602f0016400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:22 executing program 3: 09:57:22 executing program 4: 09:57:22 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x4}}]}, 0x30}}, 0x0) 09:57:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:22 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x2, 0x0, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'hsr0\x00', @link_local}) 09:57:22 executing program 3: [ 727.962461][T28264] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 09:57:22 executing program 4: [ 728.073415][T28273] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:57:23 executing program 5: socket(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x4}}]}, 0x30}}, 0x0) 09:57:23 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x2, 0x0, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'hsr0\x00', @link_local}) [ 728.125205][T28273] netlink: 10218 bytes leftover after parsing attributes in process `syz-executor.1'. [ 728.156837][T28281] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:23 executing program 3: 09:57:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, 0x0, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 728.611283][T28305] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 728.735400][T28290] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 728.886363][T28318] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 728.929914][T28318] netlink: 10218 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60350016400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:24 executing program 4: 09:57:24 executing program 3: 09:57:24 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'hsr0\x00', @link_local}) 09:57:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, 0x0, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:24 executing program 5: socket(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x4}}]}, 0x30}}, 0x0) 09:57:24 executing program 4: [ 729.239317][T28336] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 09:57:24 executing program 3: 09:57:24 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'hsr0\x00', @link_local}) [ 729.318738][T28339] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 729.342453][T28339] netlink: 10210 bytes leftover after parsing attributes in process `syz-executor.1'. [ 729.399835][T28352] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:24 executing program 5: socket(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x4}}]}, 0x30}}, 0x0) 09:57:24 executing program 3: 09:57:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, 0x0, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 729.810784][T28373] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 730.159701][T28381] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:57:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc605b0016400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:25 executing program 4: 09:57:25 executing program 3: 09:57:25 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'hsr0\x00', @link_local}) 09:57:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:25 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) 09:57:25 executing program 3: 09:57:25 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, 0x0) 09:57:25 executing program 4: [ 730.582051][T28410] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:57:25 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 730.652026][T28405] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:25 executing program 3: 09:57:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 731.094501][T28439] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 731.314643][T28450] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:57:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc606b0016400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:26 executing program 4: 09:57:26 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, 0x0) 09:57:26 executing program 3: 09:57:26 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) 09:57:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 731.506250][T28463] __nla_validate_parse: 6 callbacks suppressed [ 731.506261][T28463] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 09:57:26 executing program 4: [ 731.564133][T28469] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 731.593755][T28469] netlink: 10158 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:26 executing program 3: 09:57:26 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, 0x0) 09:57:26 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 731.744496][T28484] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:26 executing program 4: 09:57:26 executing program 3: [ 732.166434][T28490] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 732.372658][T28511] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 732.392244][T28511] netlink: 10158 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc601a2816400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:27 executing program 4: 09:57:27 executing program 3: 09:57:27 executing program 2: 09:57:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:27 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 732.687837][T28526] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 09:57:27 executing program 2: 09:57:27 executing program 3: 09:57:27 executing program 4: [ 732.824697][T28532] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 732.858514][T28544] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:27 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 09:57:27 executing program 2: 09:57:27 executing program 3: [ 733.335904][T28553] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 733.488075][ T8490] Bluetooth: hci4: command 0x0406 tx timeout [ 733.594780][T28571] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:57:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60586516400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:28 executing program 4: 09:57:28 executing program 2: 09:57:28 executing program 3: 09:57:28 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={0x0}}, 0x0) 09:57:28 executing program 2: [ 733.844738][T28586] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 09:57:28 executing program 3: 09:57:28 executing program 4: [ 733.950844][T28592] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. [ 733.991435][T28602] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:28 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={0x0}}, 0x0) 09:57:29 executing program 2: 09:57:29 executing program 3: [ 734.453171][T28611] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 734.672208][T28627] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:29 executing program 4: 09:57:29 executing program 3: 09:57:29 executing program 2: 09:57:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60008116400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:29 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={0x0}}, 0x0) 09:57:29 executing program 2: 09:57:29 executing program 4: 09:57:29 executing program 3: [ 735.095660][T28643] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:30 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x4}}]}, 0x30}}, 0x0) 09:57:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(0x0, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:30 executing program 2: 09:57:30 executing program 4: 09:57:30 executing program 3: 09:57:30 executing program 3: 09:57:30 executing program 2: [ 735.553246][T28678] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100216400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:30 executing program 4: 09:57:30 executing program 3: 09:57:30 executing program 2: 09:57:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(0x0, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:30 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x4}}]}, 0x30}}, 0x0) 09:57:31 executing program 3: 09:57:31 executing program 2: 09:57:31 executing program 4: [ 736.223444][T28720] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 736.250976][T28725] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:31 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x4}}]}, 0x30}}, 0x0) 09:57:31 executing program 3: 09:57:31 executing program 2: [ 736.742447][T28734] __nla_validate_parse: 6 callbacks suppressed [ 736.742459][T28734] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 736.991201][T28751] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 737.007221][T28751] netlink: 9738 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100316400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(0x0, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:32 executing program 4: 09:57:32 executing program 3: 09:57:32 executing program 2: 09:57:32 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x4}}]}, 0x30}}, 0x0) 09:57:32 executing program 3: 09:57:32 executing program 4: [ 737.268647][T28766] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 09:57:32 executing program 2: [ 737.351181][T28770] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 737.416882][T28782] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 737.429557][T28770] netlink: 9482 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:32 executing program 3: 09:57:32 executing program 2: 09:57:32 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x4}}]}, 0x30}}, 0x0) [ 737.882021][T28793] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 738.064540][T28808] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 738.094788][T28808] netlink: 9482 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100416400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:33 executing program 4: 09:57:33 executing program 3: 09:57:33 executing program 2: 09:57:33 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x4}}]}, 0x30}}, 0x0) 09:57:33 executing program 3: 09:57:33 executing program 2: 09:57:33 executing program 4: [ 738.428500][T28828] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 738.513618][T28833] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 738.558152][T28841] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 738.578818][T28833] netlink: 9226 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:33 executing program 4: 09:57:33 executing program 2: 09:57:33 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x4}}]}, 0x30}}, 0x0) [ 739.035861][T28852] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 739.275791][T28868] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 739.301629][T28868] netlink: 9226 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100516400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:34 executing program 3: 09:57:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:34 executing program 4: 09:57:34 executing program 2: 09:57:34 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x4}}]}, 0x30}}, 0x0) 09:57:34 executing program 4: 09:57:34 executing program 2: 09:57:34 executing program 3: 09:57:34 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x4}}]}, 0x30}}, 0x0) [ 739.641670][T28892] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:57:34 executing program 4: [ 739.726871][T28902] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:34 executing program 2: [ 740.349214][T28924] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:57:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100616400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:35 executing program 3: 09:57:35 executing program 4: 09:57:35 executing program 2: 09:57:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:35 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x24, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 09:57:35 executing program 3: 09:57:35 executing program 4: 09:57:35 executing program 2: [ 740.719651][T28948] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 740.765282][T28954] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:35 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x24, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 09:57:35 executing program 3: 09:57:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x0, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 741.213610][T28974] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 741.511644][T28988] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:57:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100716400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:36 executing program 4: 09:57:36 executing program 2: 09:57:36 executing program 3: 09:57:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x0, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:36 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x24, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 09:57:36 executing program 3: 09:57:36 executing program 4: [ 741.817937][T29006] __nla_validate_parse: 8 callbacks suppressed [ 741.817949][T29006] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 09:57:36 executing program 2: [ 741.895132][T29010] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:57:36 executing program 3: [ 741.952734][T29010] netlink: 8458 bytes leftover after parsing attributes in process `syz-executor.1'. [ 741.978991][T29005] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:36 executing program 4: 09:57:36 executing program 5: [ 742.539835][T29010] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 742.550890][T29010] netlink: 8458 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100816400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:37 executing program 2: 09:57:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x0, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:37 executing program 3: 09:57:37 executing program 5: 09:57:37 executing program 4: 09:57:37 executing program 4: 09:57:37 executing program 3: 09:57:37 executing program 5: 09:57:37 executing program 2: [ 742.876377][T29057] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 742.908457][T29057] netlink: 8202 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:37 executing program 3: 09:57:37 executing program 5: [ 742.938458][T29063] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 743.468179][T29078] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 743.476365][T29078] netlink: 8202 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100916400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:38 executing program 2: 09:57:38 executing program 4: 09:57:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x0, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:38 executing program 5: 09:57:38 executing program 3: 09:57:38 executing program 5: 09:57:38 executing program 4: 09:57:38 executing program 3: 09:57:38 executing program 2: [ 743.780541][T29098] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 743.820182][T29094] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 743.835191][T29098] netlink: 7946 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:38 executing program 4: 09:57:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x0, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 744.164610][T29118] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 744.513749][T29127] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 744.552240][T29127] netlink: 7946 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100a16400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:39 executing program 5: 09:57:39 executing program 3: 09:57:39 executing program 2: 09:57:39 executing program 4: 09:57:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x0, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:39 executing program 5: 09:57:39 executing program 4: 09:57:39 executing program 2: 09:57:39 executing program 3: [ 744.937113][T29148] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 744.971261][T29144] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:39 executing program 5: [ 745.000332][T29148] netlink: 7690 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:39 executing program 2: [ 745.527717][T29148] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 745.536254][T29148] netlink: 7690 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100b16400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:40 executing program 4: 09:57:40 executing program 3: 09:57:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x0, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:40 executing program 2: 09:57:40 executing program 5: 09:57:40 executing program 5: 09:57:40 executing program 4: 09:57:40 executing program 3: 09:57:40 executing program 2: [ 745.831109][T29186] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:57:40 executing program 5: [ 745.884031][T29191] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 745.903488][T29186] netlink: 7434 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:40 executing program 4: 09:57:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100c16400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:41 executing program 3: 09:57:41 executing program 2: 09:57:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x0, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:41 executing program 5: 09:57:41 executing program 4: 09:57:41 executing program 3: 09:57:41 executing program 2: 09:57:41 executing program 5: 09:57:41 executing program 4: [ 746.692938][T29224] nla_validate_range_unsigned: 1 callbacks suppressed [ 746.692982][T29224] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 746.737144][T29222] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x0, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:41 executing program 5: [ 747.179601][T29246] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 747.391213][T29255] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 747.399574][T29255] __nla_validate_parse: 2 callbacks suppressed [ 747.399585][T29255] netlink: 7178 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100d16400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:42 executing program 4: 09:57:42 executing program 3: 09:57:42 executing program 2: 09:57:42 executing program 5: 09:57:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x0, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:42 executing program 3: 09:57:42 executing program 2: 09:57:42 executing program 5: 09:57:42 executing program 4: [ 747.814327][T29274] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 747.829655][T29272] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:42 executing program 3: [ 747.874002][T29274] netlink: 6922 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:42 executing program 2: [ 748.570617][T29299] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 748.595075][T29299] netlink: 6922 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100e16400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:43 executing program 5: 09:57:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x0, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:43 executing program 4: 09:57:43 executing program 3: 09:57:43 executing program 2: 09:57:43 executing program 3: 09:57:43 executing program 2: 09:57:43 executing program 5: 09:57:43 executing program 4: [ 748.956478][T29317] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:57:43 executing program 3: [ 749.020096][T29317] netlink: 6666 bytes leftover after parsing attributes in process `syz-executor.1'. [ 749.049377][T29326] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:43 executing program 5: [ 749.622059][T29317] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 749.634074][T29317] netlink: 6666 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100f16400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:44 executing program 2: 09:57:44 executing program 4: 09:57:44 executing program 3: 09:57:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x0, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:44 executing program 5: 09:57:44 executing program 5: 09:57:44 executing program 3: 09:57:44 executing program 2: 09:57:44 executing program 4: [ 749.948804][T29358] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 749.977660][T29358] netlink: 6410 bytes leftover after parsing attributes in process `syz-executor.1'. [ 750.006985][T29362] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:45 executing program 5: 09:57:45 executing program 2: [ 750.581442][T29381] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 750.594679][T29381] netlink: 6410 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60101016400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:45 executing program 3: 09:57:45 executing program 4: 09:57:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:45 executing program 2: 09:57:45 executing program 5: 09:57:45 executing program 3: 09:57:45 executing program 4: 09:57:45 executing program 5: 09:57:45 executing program 2: [ 750.909787][T29401] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 750.947888][T29407] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 750.979685][T29401] netlink: 6154 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:45 executing program 2: 09:57:45 executing program 5: [ 751.694478][T29423] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 751.745342][T29423] netlink: 6154 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60101116400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:46 executing program 3: 09:57:46 executing program 4: 09:57:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:46 executing program 2: 09:57:46 executing program 5: 09:57:46 executing program 3: 09:57:46 executing program 5: 09:57:46 executing program 2: 09:57:46 executing program 4: 09:57:47 executing program 5: [ 752.115746][T29439] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 752.153449][T29446] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:57:47 executing program 2: [ 752.211895][T29446] netlink: 5898 bytes leftover after parsing attributes in process `syz-executor.1'. [ 752.795563][T29464] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 752.813562][T29464] netlink: 5898 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60101216400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:47 executing program 3: 09:57:47 executing program 4: 09:57:47 executing program 2: 09:57:47 executing program 5: 09:57:48 executing program 2: 09:57:48 executing program 3: 09:57:48 executing program 5: 09:57:48 executing program 4: [ 753.192598][T29483] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 753.222269][T29483] netlink: 5642 bytes leftover after parsing attributes in process `syz-executor.1'. [ 753.244207][T29489] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:48 executing program 2: 09:57:48 executing program 3: [ 753.855556][T29507] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 753.864878][T29507] netlink: 5642 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60101316400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:48 executing program 5: 09:57:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:48 executing program 4: 09:57:48 executing program 2: 09:57:48 executing program 3: 09:57:48 executing program 3: 09:57:49 executing program 2: 09:57:49 executing program 5: [ 754.113180][T29524] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:57:49 executing program 4: [ 754.222962][T29524] netlink: 5386 bytes leftover after parsing attributes in process `syz-executor.1'. [ 754.238813][T29529] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:49 executing program 3: 09:57:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 754.684332][T29545] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 754.889215][T29554] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 754.897729][T29554] netlink: 5386 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:49 executing program 5: 09:57:49 executing program 2: 09:57:49 executing program 4: 09:57:49 executing program 3: 09:57:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60101416400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:50 executing program 3: 09:57:50 executing program 2: 09:57:50 executing program 4: 09:57:50 executing program 5: [ 755.261395][T29573] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 755.327752][T29571] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 755.341627][T29573] netlink: 5130 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:50 executing program 3: 09:57:50 executing program 2: 09:57:50 executing program 5: 09:57:50 executing program 4: 09:57:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:50 executing program 3: [ 755.833562][T29597] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 756.073547][T29607] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 756.097616][T29607] netlink: 5130 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60101516400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:51 executing program 5: 09:57:51 executing program 2: 09:57:51 executing program 4: 09:57:51 executing program 3: 09:57:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:51 executing program 4: 09:57:51 executing program 2: 09:57:51 executing program 5: 09:57:51 executing program 3: [ 756.463405][T29625] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 756.514876][T29633] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 756.533893][T29625] netlink: 4874 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:51 executing program 4: 09:57:51 executing program 2: [ 757.178912][T29625] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 757.188482][T29625] netlink: 4874 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60101616400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:52 executing program 3: 09:57:52 executing program 2: 09:57:52 executing program 5: 09:57:52 executing program 4: 09:57:52 executing program 2: 09:57:52 executing program 3: 09:57:52 executing program 5: [ 757.559077][T29665] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:57:52 executing program 4: [ 757.604756][T29665] netlink: 4618 bytes leftover after parsing attributes in process `syz-executor.1'. [ 757.640451][T29670] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:52 executing program 2: 09:57:52 executing program 5: [ 758.275577][T29688] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 758.285200][T29688] netlink: 4618 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60101716400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:53 executing program 3: 09:57:53 executing program 4: 09:57:53 executing program 2: 09:57:53 executing program 5: 09:57:53 executing program 3: 09:57:53 executing program 2: 09:57:53 executing program 5: 09:57:53 executing program 4: [ 758.570812][T29706] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 758.624163][T29706] netlink: 4362 bytes leftover after parsing attributes in process `syz-executor.1'. [ 758.627193][T29711] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:53 executing program 5: 09:57:53 executing program 2: [ 759.328899][T29729] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 759.348323][T29729] netlink: 4362 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60101816400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:54 executing program 3: 09:57:54 executing program 4: 09:57:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:54 executing program 5: 09:57:54 executing program 2: 09:57:54 executing program 5: 09:57:54 executing program 2: 09:57:54 executing program 3: 09:57:54 executing program 4: [ 759.767478][T29748] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 759.805667][T29748] netlink: 4106 bytes leftover after parsing attributes in process `syz-executor.1'. [ 759.856298][T29755] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:54 executing program 3: 09:57:54 executing program 5: [ 760.512104][T29772] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 760.532159][T29772] netlink: 4106 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60101916400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:55 executing program 4: 09:57:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:55 executing program 2: 09:57:55 executing program 3: 09:57:55 executing program 5: 09:57:55 executing program 3: 09:57:55 executing program 5: 09:57:55 executing program 2: 09:57:55 executing program 4: [ 760.903724][T29791] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 760.958053][T29794] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 760.966967][T29791] netlink: 3850 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:55 executing program 3: [ 761.362825][T29810] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 761.703314][T29821] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 761.743149][T29821] netlink: 3850 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60101a16400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:56 executing program 2: 09:57:56 executing program 5: 09:57:56 executing program 4: 09:57:56 executing program 3: 09:57:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:56 executing program 5: 09:57:56 executing program 3: 09:57:56 executing program 4: 09:57:57 executing program 2: [ 762.094076][T29840] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 762.152833][T29844] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 762.196205][T29840] netlink: 3594 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:57 executing program 5: 09:57:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 762.645009][T29860] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 762.876133][T29870] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 762.912614][T29870] netlink: 3594 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60101b16400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:58 executing program 2: 09:57:58 executing program 3: 09:57:58 executing program 4: 09:57:58 executing program 5: 09:57:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:58 executing program 2: 09:57:58 executing program 3: 09:57:58 executing program 4: [ 763.477023][T29891] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:57:58 executing program 5: [ 763.518932][T29893] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 763.594314][T29891] netlink: 3338 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:58 executing program 4: [ 763.937359][T29910] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 764.260438][T29914] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 764.271540][T29914] netlink: 3338 bytes leftover after parsing attributes in process `syz-executor.1'. 09:57:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60101c16400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:57:59 executing program 2: 09:57:59 executing program 3: 09:57:59 executing program 5: 09:57:59 executing program 4: 09:57:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:57:59 executing program 2: 09:57:59 executing program 5: 09:57:59 executing program 3: 09:57:59 executing program 4: [ 764.541839][T29937] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 764.600135][T29937] netlink: 3082 bytes leftover after parsing attributes in process `syz-executor.1'. [ 764.625318][T29944] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:57:59 executing program 5: 09:57:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 765.107939][T29958] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 765.328246][T29968] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 765.397157][T29968] netlink: 3082 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60101d16400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:00 executing program 2: 09:58:00 executing program 3: 09:58:00 executing program 4: 09:58:00 executing program 5: 09:58:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:01 executing program 3: 09:58:01 executing program 4: 09:58:01 executing program 5: 09:58:01 executing program 2: [ 766.212221][T29986] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 766.284027][T29989] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 766.367137][T29986] netlink: 2826 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:01 executing program 3: [ 766.852039][T30007] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 767.011550][T30016] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 767.021901][T30016] netlink: 2826 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60101e16400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:01 executing program 2: 09:58:01 executing program 5: 09:58:01 executing program 4: 09:58:01 executing program 3: 09:58:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:02 executing program 2: 09:58:02 executing program 3: 09:58:02 executing program 4: 09:58:02 executing program 5: [ 767.293826][T30034] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 767.317244][T30034] netlink: 2570 bytes leftover after parsing attributes in process `syz-executor.1'. [ 767.368272][T30032] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:02 executing program 2: 09:58:02 executing program 3: [ 767.961798][T30056] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 767.982172][T30056] netlink: 2570 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:03 executing program 5: 09:58:03 executing program 4: 09:58:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:03 executing program 3: 09:58:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60102116400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:03 executing program 2: 09:58:03 executing program 3: 09:58:03 executing program 2: 09:58:03 executing program 4: 09:58:03 executing program 5: [ 768.310957][T30075] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 768.424117][T30075] netlink: 1802 bytes leftover after parsing attributes in process `syz-executor.1'. [ 768.457713][T30080] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:03 executing program 3: 09:58:03 executing program 2: 09:58:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:03 executing program 4: 09:58:03 executing program 5: 09:58:03 executing program 2: [ 768.949152][T30100] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 769.128661][T30109] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 769.142648][T30109] netlink: 1802 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60102216400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:04 executing program 4: 09:58:04 executing program 3: 09:58:04 executing program 5: 09:58:04 executing program 2: 09:58:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:04 executing program 3: 09:58:04 executing program 5: 09:58:04 executing program 2: 09:58:04 executing program 4: [ 769.446460][T30129] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 769.482412][T30129] netlink: 1546 bytes leftover after parsing attributes in process `syz-executor.1'. [ 769.541582][T30126] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:04 executing program 2: 09:58:04 executing program 3: [ 770.147860][T30152] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 770.172976][T30152] netlink: 1546 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60102316400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:05 executing program 4: 09:58:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:05 executing program 5: 09:58:05 executing program 2: 09:58:05 executing program 3: 09:58:05 executing program 2: 09:58:05 executing program 5: 09:58:05 executing program 3: 09:58:05 executing program 4: [ 770.567544][T30173] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 770.591656][T30176] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 770.619435][T30173] netlink: 1290 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:05 executing program 2: 09:58:05 executing program 3: [ 771.367618][T30195] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 771.375809][T30195] netlink: 1290 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60102416400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:06 executing program 4: 09:58:06 executing program 5: 09:58:06 executing program 3: 09:58:06 executing program 2: 09:58:06 executing program 3: 09:58:06 executing program 5: 09:58:06 executing program 2: 09:58:06 executing program 4: [ 771.843111][T30214] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 771.885099][T30211] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 771.897924][T30214] netlink: 1034 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:06 executing program 4: 09:58:06 executing program 3: [ 772.563137][T30236] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 772.583253][T30236] netlink: 1034 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60102516400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:07 executing program 5: 09:58:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:07 executing program 2: 09:58:07 executing program 4: 09:58:07 executing program 3: 09:58:07 executing program 4: 09:58:07 executing program 5: 09:58:07 executing program 3: 09:58:07 executing program 2: [ 772.881610][T30255] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 772.902241][T30255] netlink: 778 bytes leftover after parsing attributes in process `syz-executor.1'. [ 772.984813][T30261] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:07 executing program 4: 09:58:08 executing program 5: [ 773.649466][T30255] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 773.660708][T30255] netlink: 778 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60102616400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:08 executing program 2: 09:58:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:08 executing program 3: 09:58:08 executing program 4: 09:58:08 executing program 5: [ 774.104952][T30294] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:58:09 executing program 3: 09:58:09 executing program 4: 09:58:09 executing program 5: [ 774.182507][T30294] netlink: 522 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:09 executing program 2: [ 774.264594][T30299] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:09 executing program 5: 09:58:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 774.849509][T30311] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 774.921790][T30318] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 774.946273][T30318] netlink: 522 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60102716400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:10 executing program 4: 09:58:10 executing program 3: 09:58:10 executing program 2: 09:58:10 executing program 5: 09:58:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:10 executing program 5: 09:58:10 executing program 2: 09:58:10 executing program 3: 09:58:10 executing program 4: [ 775.523797][T30345] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 775.621114][T30344] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 775.691333][T30344] netlink: 266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:10 executing program 5: [ 775.941768][T30362] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 776.508040][T30366] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 776.536281][T30366] netlink: 266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:12 executing program 2: 09:58:12 executing program 3: 09:58:12 executing program 4: 09:58:12 executing program 5: 09:58:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60102816400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:12 executing program 2: 09:58:12 executing program 5: 09:58:12 executing program 3: 09:58:12 executing program 4: [ 777.382839][T30390] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 777.438759][T30392] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 777.472347][T30390] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:12 executing program 5: 09:58:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:12 executing program 2: 09:58:12 executing program 4: 09:58:12 executing program 3: 09:58:12 executing program 5: [ 777.963484][T30411] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 778.249131][T30418] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 778.273930][T30418] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60102916400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:13 executing program 2: 09:58:13 executing program 3: 09:58:13 executing program 4: 09:58:13 executing program 5: 09:58:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:13 executing program 2: 09:58:13 executing program 4: 09:58:13 executing program 3: 09:58:13 executing program 5: [ 778.982274][T30443] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. [ 778.997811][T30438] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:14 executing program 2: 09:58:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 779.544218][T30456] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 779.737390][T30468] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60102a16400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:14 executing program 4: 09:58:14 executing program 3: 09:58:14 executing program 5: 09:58:14 executing program 2: 09:58:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:15 executing program 3: 09:58:15 executing program 2: 09:58:15 executing program 5: 09:58:15 executing program 4: [ 780.337723][T30485] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. [ 780.417978][T30489] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:15 executing program 3: 09:58:15 executing program 2: [ 781.108645][T30507] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:16 executing program 4: 09:58:16 executing program 5: 09:58:16 executing program 3: 09:58:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60102b16400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:16 executing program 2: 09:58:16 executing program 5: 09:58:16 executing program 2: 09:58:16 executing program 3: 09:58:16 executing program 4: [ 781.444900][T30525] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. [ 781.470556][T30522] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:16 executing program 3: 09:58:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:16 executing program 2: 09:58:16 executing program 5: 09:58:16 executing program 4: 09:58:16 executing program 3: [ 782.007003][T30547] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 782.227813][T30551] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:17 executing program 5: 09:58:17 executing program 2: 09:58:17 executing program 4: 09:58:17 executing program 3: 09:58:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60102c16400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:17 executing program 3: 09:58:17 executing program 4: 09:58:17 executing program 5: 09:58:17 executing program 2: [ 782.603035][T30576] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. [ 782.658925][T30578] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:17 executing program 3: 09:58:17 executing program 2: 09:58:17 executing program 5: 09:58:17 executing program 4: 09:58:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:17 executing program 3: [ 783.271416][T30599] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 783.510800][T30602] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:18 executing program 5: 09:58:18 executing program 2: 09:58:18 executing program 4: 09:58:18 executing program 3: 09:58:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60102d16400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:18 executing program 3: 09:58:18 executing program 2: 09:58:18 executing program 5: 09:58:18 executing program 4: [ 784.036679][T30628] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. [ 784.046213][T30629] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:19 executing program 3: 09:58:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:19 executing program 2: 09:58:19 executing program 5: 09:58:19 executing program 4: 09:58:19 executing program 3: [ 784.481205][T30649] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 784.827912][T30655] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60102e16400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:19 executing program 2: 09:58:19 executing program 5: 09:58:19 executing program 3: 09:58:19 executing program 4: 09:58:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:20 executing program 2: 09:58:20 executing program 3: 09:58:20 executing program 4: 09:58:20 executing program 5: [ 785.319834][T30679] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. [ 785.358822][T30681] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:20 executing program 2: 09:58:20 executing program 5: [ 786.079661][T30700] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60102f16400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:21 executing program 3: 09:58:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:21 executing program 4: 09:58:21 executing program 2: 09:58:21 executing program 5: 09:58:21 executing program 4: 09:58:21 executing program 3: 09:58:21 executing program 2: 09:58:21 executing program 5: [ 786.472304][T30720] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. [ 786.558598][T30726] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:21 executing program 2: 09:58:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 786.977368][T30741] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 787.257338][T30751] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60103016400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:22 executing program 3: 09:58:22 executing program 5: 09:58:22 executing program 4: 09:58:22 executing program 2: 09:58:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:22 executing program 5: 09:58:22 executing program 2: 09:58:22 executing program 3: 09:58:22 executing program 4: [ 787.643159][T30770] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. [ 787.713604][T30767] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:22 executing program 5: 09:58:22 executing program 4: [ 788.400108][T30792] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60103116400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:23 executing program 3: 09:58:23 executing program 2: 09:58:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:23 executing program 5: 09:58:23 executing program 4: 09:58:23 executing program 2: 09:58:23 executing program 3: 09:58:23 executing program 5: 09:58:23 executing program 4: [ 788.746112][T30812] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. [ 788.833834][T30821] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:23 executing program 2: 09:58:23 executing program 4: [ 789.419950][T30834] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:24 executing program 3: 09:58:24 executing program 5: 09:58:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={0x0, 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:24 executing program 2: 09:58:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60103216400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:24 executing program 4: 09:58:24 executing program 2: 09:58:24 executing program 5: 09:58:24 executing program 3: 09:58:24 executing program 4: [ 789.732659][T30852] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. [ 789.771367][T30853] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:24 executing program 4: 09:58:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={0x0, 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:24 executing program 3: 09:58:24 executing program 2: 09:58:24 executing program 5: 09:58:24 executing program 4: [ 790.249418][T30877] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 790.507640][T30886] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60103316400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:25 executing program 2: 09:58:25 executing program 3: 09:58:25 executing program 5: 09:58:25 executing program 4: 09:58:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={0x0, 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:25 executing program 2: 09:58:25 executing program 4: 09:58:25 executing program 3: 09:58:25 executing program 5: [ 790.874614][T30904] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. [ 790.966910][T30910] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:25 executing program 2: 09:58:25 executing program 5: [ 791.574909][T30928] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60103416400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:26 executing program 3: 09:58:26 executing program 4: 09:58:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00)}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:26 executing program 2: 09:58:26 executing program 5: 09:58:26 executing program 5: 09:58:26 executing program 2: 09:58:26 executing program 3: 09:58:26 executing program 4: [ 791.852860][T30947] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. [ 791.893680][T30951] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:26 executing program 3: 09:58:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00)}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 792.348842][T30967] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 792.656641][T30973] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60103516400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:27 executing program 4: 09:58:27 executing program 5: 09:58:27 executing program 2: 09:58:27 executing program 3: 09:58:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00)}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:27 executing program 3: 09:58:27 executing program 5: 09:58:27 executing program 2: 09:58:27 executing program 4: 09:58:28 executing program 3: 09:58:28 executing program 2: [ 793.081351][T30996] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. [ 793.185705][T31004] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 793.794917][T31018] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60104816400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:28 executing program 5: 09:58:28 executing program 4: 09:58:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x0, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:28 executing program 3: 09:58:28 executing program 2: 09:58:28 executing program 3: 09:58:28 executing program 4: 09:58:28 executing program 2: 09:58:29 executing program 5: [ 794.165037][T31039] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. [ 794.180640][T31034] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x0, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:29 executing program 2: [ 794.669086][T31057] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 794.950219][T31063] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60104c16400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:29 executing program 4: 09:58:29 executing program 3: 09:58:29 executing program 5: 09:58:29 executing program 2: 09:58:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x0, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:30 executing program 3: 09:58:30 executing program 2: 09:58:30 executing program 5: 09:58:30 executing program 4: [ 795.297510][T31087] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. [ 795.347099][T31093] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:30 executing program 3: 09:58:30 executing program 2: [ 796.000429][T31110] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60106016400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:31 executing program 5: 09:58:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0x0, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:31 executing program 4: 09:58:31 executing program 2: 09:58:31 executing program 3: 09:58:31 executing program 4: 09:58:31 executing program 5: 09:58:31 executing program 2: 09:58:31 executing program 3: [ 796.405468][T31128] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. [ 796.485780][T31137] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:31 executing program 4: 09:58:31 executing program 5: [ 797.032993][T31152] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60106816400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:32 executing program 2: 09:58:32 executing program 3: 09:58:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0x0, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:32 executing program 4: 09:58:32 executing program 5: 09:58:32 executing program 4: 09:58:32 executing program 5: 09:58:32 executing program 2: [ 797.369562][T31170] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:32 executing program 3: [ 797.489392][T31178] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:32 executing program 4: 09:58:32 executing program 2: [ 798.133985][T31170] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60106c16400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:33 executing program 3: 09:58:33 executing program 5: 09:58:33 executing program 4: 09:58:33 executing program 2: 09:58:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0x0, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:33 executing program 3: 09:58:33 executing program 2: 09:58:33 executing program 5: 09:58:33 executing program 4: [ 798.532635][T31214] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. [ 798.538820][T31216] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:33 executing program 2: 09:58:33 executing program 3: [ 799.158529][T31234] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60107416400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:34 executing program 5: 09:58:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x0, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:34 executing program 4: 09:58:34 executing program 2: 09:58:34 executing program 3: 09:58:34 executing program 2: 09:58:34 executing program 4: 09:58:34 executing program 3: 09:58:34 executing program 5: [ 799.528344][T31253] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. [ 799.604448][T31258] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:34 executing program 2: 09:58:34 executing program 3: [ 800.265301][T31275] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60107a16400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x0, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:35 executing program 5: 09:58:35 executing program 4: 09:58:35 executing program 2: 09:58:35 executing program 3: 09:58:35 executing program 5: 09:58:35 executing program 3: 09:58:35 executing program 4: 09:58:35 executing program 2: [ 800.698739][T31296] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. [ 800.763375][T31300] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:35 executing program 5: 09:58:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x0, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 801.247806][T31317] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 801.455099][T31322] netlink: 10266 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100018400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:36 executing program 2: 09:58:36 executing program 4: 09:58:36 executing program 3: 09:58:36 executing program 5: 09:58:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x0, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:36 executing program 2: 09:58:36 executing program 5: 09:58:36 executing program 3: 09:58:36 executing program 4: [ 801.745648][T31345] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 801.753744][T31341] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:36 executing program 2: 09:58:36 executing program 5: [ 801.819072][T31350] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100028400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x0, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:36 executing program 3: 09:58:36 executing program 4: 09:58:36 executing program 2: 09:58:36 executing program 5: 09:58:36 executing program 2: 09:58:36 executing program 4: 09:58:37 executing program 3: 09:58:37 executing program 5: [ 802.122424][T31364] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 802.270361][T31365] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:37 executing program 2: 09:58:37 executing program 4: [ 802.872129][T31389] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100035400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:38 executing program 3: 09:58:38 executing program 5: 09:58:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x0, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:38 executing program 2: 09:58:38 executing program 4: 09:58:38 executing program 4: 09:58:38 executing program 3: 09:58:38 executing program 5: 09:58:38 executing program 2: [ 803.481234][T31409] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 803.585762][T31412] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:38 executing program 4: 09:58:38 executing program 3: [ 804.254078][T31428] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:39 executing program 5: 09:58:39 executing program 2: 09:58:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0x0, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:39 executing program 3: 09:58:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010005b400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:39 executing program 4: 09:58:39 executing program 4: 09:58:39 executing program 5: 09:58:39 executing program 2: 09:58:39 executing program 3: [ 804.876145][T31449] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 804.923753][T31454] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:39 executing program 5: 09:58:39 executing program 4: 09:58:39 executing program 2: 09:58:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0x0, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:40 executing program 3: 09:58:40 executing program 5: [ 805.452565][T31474] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 805.610416][T31478] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010006b400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:40 executing program 4: 09:58:40 executing program 2: 09:58:40 executing program 5: 09:58:40 executing program 3: 09:58:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0x0, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:40 executing program 5: 09:58:40 executing program 3: 09:58:40 executing program 2: 09:58:40 executing program 4: [ 805.931750][T31502] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 805.986629][T31505] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:41 executing program 5: 09:58:41 executing program 2: [ 806.724714][T31521] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100018400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:41 executing program 4: 09:58:41 executing program 3: 09:58:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0x0, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:41 executing program 5: 09:58:41 executing program 2: 09:58:42 executing program 3: 09:58:42 executing program 5: 09:58:42 executing program 4: 09:58:42 executing program 2: [ 807.255140][T31544] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 807.330545][T31552] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 807.338672][T31553] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:42 executing program 4: 09:58:42 executing program 3: 09:58:42 executing program 2: 09:58:42 executing program 5: 09:58:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100028400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0x0, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:42 executing program 4: 09:58:42 executing program 2: 09:58:42 executing program 3: 09:58:42 executing program 5: [ 807.655060][T31562] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:42 executing program 5: [ 807.828032][T31574] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:42 executing program 3: 09:58:42 executing program 4: 09:58:42 executing program 2: 09:58:42 executing program 4: 09:58:42 executing program 5: [ 808.478022][T31587] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100035400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:43 executing program 3: 09:58:43 executing program 2: 09:58:43 executing program 4: 09:58:43 executing program 5: 09:58:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0x0, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:43 executing program 5: 09:58:43 executing program 4: 09:58:43 executing program 2: 09:58:43 executing program 3: [ 808.900730][T31611] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:43 executing program 5: [ 808.945303][T31617] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:43 executing program 4: [ 809.490154][T31633] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010005b400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:44 executing program 3: 09:58:44 executing program 2: 09:58:44 executing program 5: 09:58:44 executing program 4: 09:58:44 executing program 4: 09:58:44 executing program 2: 09:58:44 executing program 3: 09:58:44 executing program 5: [ 809.873944][T31652] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 809.885776][T31650] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:44 executing program 2: [ 810.278245][T31672] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 810.553590][T31681] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010006b400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:45 executing program 4: 09:58:45 executing program 5: 09:58:45 executing program 3: 09:58:45 executing program 2: 09:58:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:45 executing program 3: 09:58:45 executing program 2: 09:58:45 executing program 5: [ 810.902096][T31701] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:45 executing program 4: [ 810.982133][T31706] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:45 executing program 3: 09:58:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x0, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 811.467898][T31722] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016020a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:46 executing program 2: 09:58:46 executing program 4: 09:58:46 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:58:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:58:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x0, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:46 executing program 2: perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xf5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:58:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000840)=@raw={'raw\x00', 0x10, 0x3, 0x350, 0x0, 0x160, 0x160, 0x0, 0x0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@common=@unspec=@addrtype1={{0x28, 'addrtype\x00'}}, @common=@unspec=@ipvs={{0x48, 'ipvs\x00'}, {@ipv6=@empty}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, [], [], 'veth0_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@unspec=@addrtype1={{0x28, 'addrtype\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x160}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b3) 09:58:46 executing program 3: r0 = fsopen(&(0x7f00000003c0)='proc\x00', 0x0) r1 = fsopen(&(0x7f00000003c0)='proc\x00', 0x0) r2 = socket(0x840000000002, 0x3, 0x200000000000ff) r3 = socket(0x840000000002, 0x3, 0x200000000000ff) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r0, r1, 0x0) [ 811.983866][T31754] __nla_validate_parse: 1 callbacks suppressed [ 811.983931][T31754] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:46 executing program 2: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)='\x00', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r0, r1}, 0x0, 0x0, 0x0) [ 812.038712][T31748] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x30}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x287b361ae6c523fa, 0x10, &(0x7f0000000000), 0x128}, 0x48) 09:58:47 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) [ 812.784582][T31793] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016090a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x0, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:47 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dri/renderD128\x00', 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000480)='/dev/snd/controlC#\x00', 0x0, 0x0) dup2(r1, r0) 09:58:47 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000080), 0x4) 09:58:47 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:58:47 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:58:48 executing program 3: r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x0) add_key(0x0, &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x40045731, &(0x7f0000000240)) 09:58:48 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f0000000080)) [ 813.160001][T31822] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 813.174520][T31823] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:48 executing program 4: r0 = socket(0x15, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt(r0, 0x200000000114, 0x271d, 0x0, &(0x7f0000000000)) 09:58:48 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:58:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r4 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r4, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r4, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, 0xffffffffffffffff, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) sched_setattr(0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e37, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x40002, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, 0xffffffffffffffff, 0x0) [ 813.785797][T31850] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 814.019868][T31854] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016250a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x8, 0x3, 0x1d8, 0x0, 0x0, 0x148, 0x98, 0x0, 0x140, 0x2a8, 0x2a8, 0x140, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00'}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 09:58:49 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:58:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r4 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r4, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r4, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, 0xffffffffffffffff, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:49 executing program 4: r0 = socket$inet(0x2, 0x80001, 0x84) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}, &(0x7f0000000080)=0x20) 09:58:49 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@private, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@dev}}, 0xe8) r1 = socket$key(0xf, 0x3, 0x2) dup2(r1, r0) [ 814.462896][T31875] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' 09:58:49 executing program 4: r0 = timerfd_create(0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x387b1d0849078267, 0x8031, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f000000b000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) [ 814.557590][T31885] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 814.634350][T31890] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:49 executing program 2: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x0, 0x8, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4bb6bd6c"}, 0x0, 0x0, @userptr}) 09:58:49 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:58:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r4 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r4, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r4, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, 0xffffffffffffffff, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}, 0x1c) sendmsg$NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\\'], 0x5c}}, 0x0) connect(r0, &(0x7f00000001c0)=@in={0x2, 0x4e24, @remote}, 0x80) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000d7, 0x0) 09:58:49 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x9f9}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r0, r1, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000680)='./bus\x00', 0x1c7) [ 815.206546][T31915] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 815.276037][ T28] audit: type=1800 audit(1599386330.135:44): pid=31918 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16147 res=0 errno=0 [ 815.483167][T31922] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:50 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:58:50 executing program 2: socket(0x10, 0x3, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x680, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x4, 0x9, 0x7ff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76006e) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000100)={0x5}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76006e) 09:58:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc601000163e0a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 815.956962][T31947] ubi0: attaching mtd0 [ 815.987848][T31947] ubi0: scanning is finished [ 815.993039][T31947] ubi0: empty MTD device detected [ 816.065121][ T28] audit: type=1800 audit(1599386330.925:45): pid=31918 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16147 res=0 errno=0 09:58:51 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x7ff, @none, 0xe0}, 0xe) [ 816.143426][T31957] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:51 executing program 3: set_mempolicy(0x3, &(0x7f0000000000)=0xfff, 0x4) syz_emit_ethernet(0x4e, &(0x7f0000000040)={@empty, @multicast, @val={@void}, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @name_distributor={{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}, 0x0) 09:58:51 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) umount2(&(0x7f0000000380)='./file1\x00', 0x0) [ 816.239225][T31947] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 816.253850][T31959] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 816.254566][T31947] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes 09:58:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 816.296206][T31947] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 816.336068][T31947] ubi0: VID header offset: 64 (aligned 64), data offset: 128 09:58:51 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f00000000c0)={0x0, "6d291d1fb4597cbeadd3197731dc86ef1a43d8559666ed6e4a60bf9a294359cc"}) [ 816.400825][T31947] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 09:58:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xbc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 816.460770][T31947] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 09:58:51 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0xf36117d59f9bbc99}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vcan0\x00'}) 09:58:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f00000047c0)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="0411000003013b67"], 0x1104}], 0x1}, 0x0) read(r0, &(0x7f0000000040)=""/229, 0xe5) r1 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r1, &(0x7f00000047c0)={0x0, 0x13, &(0x7f0000000000)=[{&(0x7f0000000040)=ANY=[@ANYBLOB="040b000000013f"], 0x1104}], 0x1}, 0x0) [ 816.571566][T31947] ubi0: max/mean erase counter: 0/0, WL threshold: 4096, image sequence number: 734666700 09:58:51 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) [ 816.662467][T31947] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 816.747099][T31985] netlink: 4336 bytes leftover after parsing attributes in process `syz-executor.3'. [ 816.780302][T31963] ubi0: background thread "ubi_bgt0d" started, PID 31963 [ 816.786941][T31954] ubi: mtd0 is already attached to ubi0 [ 816.799762][T31994] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 816.896036][T31996] netlink: 2800 bytes leftover after parsing attributes in process `syz-executor.3'. 09:58:51 executing program 2: socket(0x10, 0x3, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x680, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x4, 0x9, 0x7ff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76006e) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000100)={0x5}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76006e) [ 816.989776][T31985] netlink: 4336 bytes leftover after parsing attributes in process `syz-executor.3'. [ 817.048459][T32004] netlink: 2444 bytes leftover after parsing attributes in process `syz-executor.3'. [ 817.106778][T32006] ubi: mtd0 is already attached to ubi0 [ 817.190449][T32000] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 817.230872][T32006] ubi: mtd0 is already attached to ubi0 09:58:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc601000165b0a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:52 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:58:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:52 executing program 2: socket(0x10, 0x3, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x680, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x4, 0x9, 0x7ff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76006e) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000100)={0x5}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76006e) 09:58:52 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0xfffffffd}, 0x8) 09:58:52 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0305602, &(0x7f0000000300)={0xfffffffd, 0x0, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "ab4cd0cf"}}) 09:58:52 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r1, 0x0) setgroups(0x2, &(0x7f0000000080)=[0x0, r1]) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) [ 817.555159][T32033] ubi: mtd0 is already attached to ubi0 09:58:52 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x3) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 09:58:52 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) [ 817.637390][T32042] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 817.652796][T32033] ubi: mtd0 is already attached to ubi0 [ 817.679436][T32044] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:58:52 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400400, 0x0, 0x1}, 0x40) 09:58:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r3 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r4 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r4, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r4, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r3, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:58:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000900)=@mangle={'mangle\x00', 0x44, 0x6, 0x20000d38, 0x98, 0x98, 0x98, 0x98, 0x1e0, 0x340, 0x340, 0x340, 0x340, 0x340, 0x6, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'bridge_slave_0\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@private, @broadcast, 0x0, 0x0, 'netpci0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00'}}, {{@uncond, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@ipv4={[], [], @private}}}}, {{@ip={@rand_addr, @dev, 0x0, 0x0, 'syzkaller0\x00', 'batadv_slave_1\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@inet=@dccp={{0x30, 'dccp\x00'}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x438) [ 818.403335][T32072] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc601000166b0a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:53 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vim2m\x00', 0x2, 0x0) socket$tipc(0x1e, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 09:58:53 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(0xffffffffffffffff, r0, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:58:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa, 0x2, 0x3, 0x21f}, 0x40) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 09:58:53 executing program 3: socket$unix(0x1, 0x1, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="c17aade07cc20442501b798c7a1d42164c2d5ad3b0004ca0195c7e", @ANYRES32, @ANYBLOB="00000000000000000800000009000100666c6f77000000003400020030000b8008000100060000002400028020000100000004000000000008000200000000000c0001000000000000000000"], 0x64}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000100)={@mcast2}, 0x14) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000000080)=@abs={0x1}, 0x6e) 09:58:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r3 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r4 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r4, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r4, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r3, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 818.724108][T32102] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:53 executing program 2: clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x0, 0x0, 0x7, 0x1}]}}, &(0x7f0000000340)=""/142, 0x26, 0x8e, 0x8}, 0x20) 09:58:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, 0x0, 0x0) 09:58:53 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(0xffffffffffffffff, r0, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:58:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r3 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r4 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r4, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r4, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r3, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000000e", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 819.037307][T32116] BPF:[1] FWD (anon) [ 819.057841][T32117] BPF:[1] FWD (anon) [ 819.072319][T32116] BPF:struct [ 819.096580][T32117] BPF:struct [ 819.109109][T32116] BPF: [ 819.131040][T32117] BPF: [ 819.150574][T32116] BPF:type != 0 09:58:54 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(0xffffffffffffffff, r0, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:58:54 executing program 2: set_mempolicy(0x1, 0x0, 0x0) setreuid(0x0, 0xee01) syz_io_uring_setup(0x5f65, &(0x7f0000000240), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) [ 819.171750][T32117] BPF:type != 0 [ 819.180422][T32116] BPF: [ 819.180422][T32116] [ 819.205132][T32117] BPF: [ 819.205132][T32117] [ 819.661841][T32147] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010001640020002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:54 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x2008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x6000, 0x0) read$FUSE(r0, &(0x7f0000006200)={0x2020}, 0x3e80000000) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000200)={0x6}) write$9p(0xffffffffffffffff, &(0x7f0000001400), 0x0) 09:58:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000004c0)="bd", 0x1, r3) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000001c0)={r4}, &(0x7f0000000280)={'enc=', 'raw', ' hash=', {'blake2b-384-generic\x00'}}, 0x0, 0x0) 09:58:54 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:58:54 executing program 4: r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000680)='\x00', 0x1, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffc, r1, 0x0) 09:58:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, 0x0, 0x0) 09:58:54 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x3, 0x0, 0x0, [{}]}]}}, &(0x7f0000000300)=""/250, 0x32, 0xfa, 0x8}, 0x20) 09:58:54 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, &(0x7f00000000c0), r1, 0x0, 0x1000000003, 0x0) 09:58:55 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet(0xa, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) [ 820.063653][T32178] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 820.099019][T32178] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 820.167145][T32190] BPF:[1] ARRAY (anon) 09:58:55 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) [ 820.210300][T32190] BPF:type_id=0 index_type_id=0 nr_elems=0 [ 820.256320][T32190] BPF: [ 820.285661][T32190] BPF:vlen != 0 09:58:55 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x74, 0x8000000000001, 0x0, 0x0, 0x0, 0x100000000, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 09:58:55 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f00000004c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) [ 820.325144][T32190] BPF: [ 820.325144][T32190] [ 820.387957][T32201] IPVS: ftp: loaded support on port[0] = 21 [ 820.778625][T32216] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 820.793729][T32216] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010001640030002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, 0x0, 0x0) 09:58:55 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:58:55 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x2}}, 0x10) 09:58:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000200)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_AND={0x15, 0x1, {{{}, 0x0, 0x0, 0x0, 0x0, "364151330e6a02e4"}, 0x2}}, @CGW_CS_CRC8={0x11e, 0x6, {0x11, 0x0, 0x0, 0x0, 0x0, "077094651ac0636054ee8b92247a82ef67842878289f67411827bb1165d21da366741e6ee0e01388be48e326b31e79b116279b4e3ac9de9a9777ee21df88f74d39881a241124590638b0f526f68a92c75d423ecfc51d45764403a6b04d44bccadde5955c6e4f9e4d747bf2538ae92fa098065e2c0713cccbd98481d0f300720f36e4c964bab562979cfbff73e08e54bfd3224511f467777a00494442bebbe767d3225df8802cc0120ab3d1bd49a33a87cf4acb060589fa282698033130c317f7ed04f8abc7a641216d56c03e17465df27733adb0c970c872bae6aafbd6af509edcb7fb379b955dd660f67ba2f7d8d2ecfa4a8f498e936c77990f116371e54629", 0x0, "2b8dd30628cdb66ee22e05eec944a596dfae1404"}}]}, 0x14c}}, 0x0) 09:58:56 executing program 4: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xe, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x0, 0x1}, 0x40) [ 821.157399][T32266] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 821.192566][T32266] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 821.248843][T32274] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 821.270225][T32274] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:56 executing program 2: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0x800005, 0x7, 0x0, 0xffffffffffffffff}) r2 = dup(r1) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x400000, 0x0, 0x11, r2, 0x0) 09:58:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010001640040002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 821.454078][T32286] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:58:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000080)) 09:58:56 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:58:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, 0x0, 0x0) 09:58:56 executing program 4: dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffa2}}], 0x400000000000953, 0x42, 0x0) 09:58:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x59) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 09:58:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@ipmr_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0x80, 0x20}}, 0x1c}}, 0x0) 09:58:56 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:58:56 executing program 3: io_setup(0x20, &(0x7f00000003c0)=0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r0, 0x3, &(0x7f0000000380)=[&(0x7f00000000c0)={0x400000000812d000, 0x9, 0x3, 0x1, 0x0, r1, 0x0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, 0x0]) 09:58:56 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r0, 0xc1004110, &(0x7f0000000080)={0x0, [0x9, 0x3, 0xfffffffe], [{}, {0x0, 0x2}, {}, {0x0, 0x1ff}, {0x0, 0x40}, {0x0, 0xfffffffe}, {0x0, 0x3ffffe00}, {0x0, 0x2}, {}, {0x0, 0xfffff7fd}], 0x400}) 09:58:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0) [ 822.220684][ T282] tipc: TX() has been purged, node left! 09:58:57 executing program 4: mkdir(&(0x7f0000000080)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x8000, 0x0) [ 822.328154][T32331] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 822.372274][T32331] __nla_validate_parse: 1 callbacks suppressed [ 822.372284][T32331] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016400b0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64-generic\x00'}, 0x58) r1 = socket(0x1, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000cc0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)='\x00', 0x600}, {&(0x7f0000000180)='U', 0x1}], 0x2, 0x0, 0x0, 0x1a0}}], 0x600, 0x0) 09:58:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') read$proc_mixer(r0, 0x0, 0x0) 09:58:57 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:58:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000002c0), 0x24, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x494081, 0x0) 09:58:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0) 09:58:57 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(0x0, &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:58:57 executing program 2: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="a400000024000b14000000800000000000001200", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000b00010074617072696f00007400020056000100020000000000000000000000000000000000080004000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000100002800c0001800800040001"], 0xa4}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10973, 0x0) 09:58:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0) [ 822.939263][T32381] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:58:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r0 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES16=r0, @ANYBLOB='\x00'/16], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYRES16, @ANYBLOB], 0x3}}, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000440)='NLBL_CIPSOv4\x00') r1 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r1, 0x200004) sendfile(r1, r1, 0x0, 0x80001d00c0d3) [ 823.039094][T32381] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 823.058046][T32389] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 09:58:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB='syztnl1\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="2100000000000000000000004500001400000000002f"]}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000000)={'syztnl1\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="2e499f17b99ce610bc47256482e5953f09952c000000ffcf"]}) [ 823.130269][T32394] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:58:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@ipv6_getaddr={0x2c, 0x16, 0x1, 0x0, 0x0, {}, [@IFA_ADDRESS={0x14, 0x1, @private0}]}, 0x2c}, 0x1, 0x6558}, 0x0) [ 823.190186][T32394] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:58 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(0x0, &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:58:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x10}, 0x0) 09:58:58 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_mreq(r0, 0x10d, 0xb, &(0x7f0000000180)={@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x14) 09:58:58 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000080)) r0 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) dup2(r2, r1) tkill(r0, 0x1000000000016) 09:58:58 executing program 4: r0 = socket(0x21, 0x2, 0x2) getsockopt$inet_int(r0, 0x110, 0x0, 0x0, 0x0) 09:58:58 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(0x0, &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) [ 823.844764][T32433] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 823.857210][T32433] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000100)) socket(0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0xb0, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x80, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x70, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x58, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7ff}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x6d6}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xf8, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8000, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0xa0c0}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x800, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3ff, 0x6}}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0xb0}, 0x1, 0x0, 0x0, 0x900}, 0x0) 09:58:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x10}, 0x0) 09:58:58 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000080)) r0 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) dup2(r2, r1) tkill(r0, 0x1000000000016) 09:58:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000070000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f00000000c0)="66b9800000c00f326635000800000f302e0f01c92e660fe3f80f0175d82666f30fc7fdf32e0f011e4000f20f78dc4e00dbdb66b9800000c00f326635010000000f300f01b60600", 0x47}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000004c000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:58:59 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', 0x0, 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) [ 824.783419][T32470] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 824.791714][T32470] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:58:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016400e0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:58:59 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000980)={'ip6tnl0\x00', 0x0}) 09:58:59 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', 0x0, 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:58:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x10}, 0x0) 09:58:59 executing program 3: keyctl$clear(0x10, 0xfffffffffffffff8) 09:59:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x44, 0x6, 0x428, 0x390, 0x98, 0x1e0, 0x0, 0x1e0, 0x390, 0x390, 0x390, 0x390, 0x390, 0x6, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x40}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'bridge_slave_1\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00'}}, {{@uncond, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@ipv4={[], [], @remote}}}}, {{@ip={@rand_addr, @multicast2, 0x0, 0x0, 'syzkaller0\x00', 'bond0\x00'}, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@inet=@dccp={{0x30, 'dccp\x00'}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x488) 09:59:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r3 = socket(0x11, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000480)={'team_slave_0\x00', 0x0}) r5 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x60, r5, 0x5, 0x0, 0x0, {0x1, 0x6c00000000000000}, [{{0x8, 0x1, r2}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x60}}, {0x8, 0x6, r4}}}]}}]}, 0x60}}, 0x0) 09:59:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) fallocate(r1, 0x8, 0x0, 0xfff000) write$FUSE_BMAP(r1, 0x0, 0x0) [ 825.324194][T32508] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:59:00 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', 0x0, 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:00 executing program 4: r0 = socket(0x1e, 0x5, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f00000000c0)={&(0x7f0000000100)={0x1e, 0x3}, 0x2000010c, &(0x7f0000000080)={0x0}}, 0x0) [ 825.380637][T32516] xt_TPROXY: Can be used only with -p tcp or -p udp [ 825.396097][T32508] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 825.403796][T32517] xt_TPROXY: Can be used only with -p tcp or -p udp 09:59:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:59:00 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) [ 825.829144][T32542] FAT-fs (loop5): bogus number of reserved sectors [ 825.867591][T32542] FAT-fs (loop5): Can't find a valid FAT filesystem [ 826.222851][T32552] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 826.271693][T32552] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010001640100002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:01 executing program 4: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = dup(r0) execveat(r1, &(0x7f00000000c0)='\x00', &(0x7f0000000240), 0x0, 0x1000) 09:59:01 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:59:01 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x20, r1, 0x703, 0x0, 0x0, {0x1c}, [@ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x20}}, 0x0) 09:59:01 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000040)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x435, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_REAPURB(r0, 0x4004550d, &(0x7f00000000c0)) [ 826.760912][T32589] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 826.767279][T32584] FAT-fs (loop5): bogus number of reserved sectors [ 826.771800][T32589] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:01 executing program 4: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r0, 0x800c5012, &(0x7f00000000c0)) [ 826.874319][T32584] FAT-fs (loop5): Can't find a valid FAT filesystem 09:59:01 executing program 3: r0 = socket(0x11, 0x80003, 0x0) sendmmsg(r0, &(0x7f0000000700)=[{{&(0x7f0000001080)=@hci={0x1f, 0x0, 0x6}, 0x80, 0x0}}, {{&(0x7f0000000280)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000001100)=[{0x10, 0x1}], 0x10}}], 0x2, 0x0) 09:59:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000007ec0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000001000010700000000000000000a0000000600010020"], 0x1c}}, 0x0) 09:59:01 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:02 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x300000b, 0x12, r0, 0x0) 09:59:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 827.310814][T32610] FAT-fs (loop5): bogus number of reserved sectors [ 827.346958][T32610] FAT-fs (loop5): Can't find a valid FAT filesystem [ 827.383555][T32614] binder: binder_mmap: 32611 20ffc000-21000000 bad vm_flags failed -1 [ 827.536240][T32624] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 827.596910][T32624] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010001640140002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee00) bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x14, 0x4, 0x8, 0xf}, 0x40) 09:59:02 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:02 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000880)=@getpolicy={0x5c, 0x15, 0x666c3d33bd7450f5, 0x0, 0x0, {{@in=@broadcast, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}, [@policy_type={0xa}]}, 0x5c}}, 0x0) 09:59:02 executing program 2: unshare(0x40000000) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000014c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) 09:59:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 828.014143][T32648] IPVS: ftp: loaded support on port[0] = 21 [ 828.028889][T32654] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 09:59:02 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"/498], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="b95b03b700030003009e40f086dd1fff060000000000002177fbac141412e0000001c699da153f08e0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 09:59:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0xc, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_256={{0x304}, "fd52bbd63e795280", "592afa184ee4ac3a93deb1d83c803a79257caa1f1305bd17c60f98599dd36fcf", '\tlhC', "0400"}, 0x38) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000000180)="8e", 0x1, 0x8000, 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @private1}], 0x1c) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) 09:59:03 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) [ 828.122390][T32661] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 828.183058][T32661] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:59:03 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:03 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) [ 828.772425][T32654] IPVS: ftp: loaded support on port[0] = 21 [ 828.896317][T32711] FAT-fs (loop5): bogus number of reserved sectors [ 828.942971][T32711] FAT-fs (loop5): Can't find a valid FAT filesystem [ 829.065394][T32708] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 829.081294][T32708] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010001640250002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:59:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 09:59:04 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) [ 829.572697][T32749] FAT-fs (loop5): bogus number of reserved sectors [ 829.579951][T32749] FAT-fs (loop5): Can't find a valid FAT filesystem [ 829.646021][ T316] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 829.702106][ T316] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 829.765476][ T334] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 829.784078][ T334] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x13e, &(0x7f0000000140)="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"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 09:59:09 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)=0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0xfc37}, @mpls={[], @ipv4=@dccp={{0x5, 0x4, 0x0, 0x0, 0x381c, 0x0, 0x0, 0x0, 0x84, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "f426e6", 0x0, "3237fb"}}}}}, 0xfdef) 09:59:09 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc02", 0x17}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:59:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) 09:59:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010001640280002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 834.305526][ T350] FAT-fs (loop5): bogus number of reserved sectors [ 834.312942][ T353] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 834.359280][ T350] FAT-fs (loop5): Can't find a valid FAT filesystem [ 834.372013][ T353] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:09 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) [ 834.817358][ T379] FAT-fs (loop5): bogus number of reserved sectors [ 834.841553][ T379] FAT-fs (loop5): Can't find a valid FAT filesystem 09:59:09 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) [ 835.090228][ T391] FAT-fs (loop5): bogus number of reserved sectors [ 835.106131][ T391] FAT-fs (loop5): Can't find a valid FAT filesystem 09:59:10 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc02", 0x17}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:59:10 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:10 executing program 3: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="740000002400fbc700"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100736671"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000c00)=ANY=[@ANYBLOB="840000002c00cdd63fe14b3b3d12000000000000", @ANYRES32=r4, @ANYBLOB="0008008000000000030000000800010075333200580002"], 0x84}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xfffffffffffffc72, 0x0) [ 835.489998][ T412] FAT-fs (loop5): bogus number of reserved sectors [ 835.531778][ T412] FAT-fs (loop5): Can't find a valid FAT filesystem [ 836.142530][ T420] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 836.153618][ T388] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 836.166615][ T388] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 836.213991][ T421] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.3'. [ 836.234648][ T422] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.3'. [ 836.358927][ T421] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 836.394670][ T420] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.3'. 09:59:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x20}}, 0x0) 09:59:12 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc02", 0x17}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:59:12 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$getflags(r0, 0x40a) 09:59:12 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x14, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x3}, 0x40) 09:59:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010001640350002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:12 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030035000505d25a80648c69940d0424fc6012000a400a000048051282c16c153e370948018000f01700d1bd", 0x33fe0}], 0x1}, 0x7a000000) [ 837.348066][ T455] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 837.380169][ T455] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) close(r0) socket$rxrpc(0x21, 0x2, 0xa) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x2, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0}]) 09:59:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010001640360002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 837.473736][ T462] FAT-fs (loop5): bogus number of reserved sectors [ 837.514937][ T462] FAT-fs (loop5): Can't find a valid FAT filesystem 09:59:12 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0x10}]}}]}, 0x3c}}, 0x0) 09:59:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac1414", 0x23}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:59:12 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:12 executing program 4: keyctl$search(0xa, 0x0, &(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x1}, 0xfffffffffffffffe) [ 837.631343][ T478] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 837.642774][ T479] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 837.667164][ T478] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 837.714385][ T479] netlink: 194480 bytes leftover after parsing attributes in process `syz-executor.3'. 09:59:12 executing program 3: clone(0x2900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) exit(0x0) 09:59:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)) [ 837.914542][ T491] FAT-fs (loop5): bogus number of reserved sectors [ 837.994912][ T491] FAT-fs (loop5): Can't find a valid FAT filesystem 09:59:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_MEMBERSHIP_INTVL={0xc}, @IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0x2}]}}}]}, 0x48}}, 0x0) 09:59:13 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="221605090000000066617400", 0xc}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac1414", 0x23}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:59:13 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000d80)={'veth0_to_bond\x00', @ifru_data=&(0x7f0000000000)="25000000e7f3ebc1207c2b57b5d07d4a6071ec6e98e48cf6d84c7606800139d8"}) [ 838.350777][ T514] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 838.536041][ T525] FAT-fs (loop5): bogus number of reserved sectors [ 838.594076][ T525] FAT-fs (loop5): Can't find a valid FAT filesystem 09:59:13 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x4307e, 0x0, 0x4) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_POLL_ADD={0x6, 0x4, 0x0, @fd=r3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 09:59:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010001640370002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:13 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$addseals(r0, 0x409, 0x0) 09:59:13 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="221605090000000066617400", 0xc}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac1414", 0x23}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:59:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x2e, &(0x7f000002eff0)={0x0, 0x0}, 0x10) [ 838.945514][ T562] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 838.976566][ T561] FAT-fs (loop5): bogus number of reserved sectors 09:59:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[], 0x17) read(r0, 0x0, 0x3f00) 09:59:13 executing program 4: futex(&(0x7f00000004c0)=0x1, 0x4, 0x0, 0x0, &(0x7f0000000580), 0x0) [ 839.040494][ T561] FAT-fs (loop5): Can't find a valid FAT filesystem [ 839.067110][ T573] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:59:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016403c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:14 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="221605090000000066617400", 0xc}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000", 0x29}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:59:14 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./file0 '], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:59:14 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x127f, 0x0) [ 839.303654][ T584] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:59:14 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x18}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 839.449495][ T591] FAT-fs (loop5): bogus number of reserved sectors 09:59:14 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x89e3, &(0x7f0000000080)) 09:59:14 executing program 2: [ 839.498220][ T591] FAT-fs (loop5): Can't find a valid FAT filesystem 09:59:14 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x101801) write$FUSE_DIRENTPLUS(r0, &(0x7f00000021c0)=ANY=[], 0xb0) select(0x40, &(0x7f0000000000), &(0x7f0000000080)={0x9}, 0x0, 0x0) 09:59:14 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:14 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)={0x38, r0, 0x427, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x8, 0x3, 0x0, 0x1, [{0x4, 0x0}]}]}]}, 0x38}}, 0x0) 09:59:14 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000002000)='./file0/file0\x00') read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) setxattr$trusted_overlay_origin(&(0x7f0000002040)='./file0/file0\x00', &(0x7f00000020c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) syz_fuse_handle_req(r0, &(0x7f0000008a40)="9eda438838743bd4e9720bee57093515dc189a5ea685e9556c1c2c3cfc4df50d66d31a48aa312663b68d18c5826b5b55fb738208863dac0f10f423aee7a5d8ddc45ebdfeb7424bae859d7c37ecfc4b63914d5a56d91017dd22bc84f759a15969951aef9d5c88c96560896988fa18cd946cfcc3a0f1c993348377904eac32c980bdf7976ebca2b499cab63c4e841514277fc71d4620e29a92523402485de0e82896484c0ae497a4d686df23ca7b68c3fd5e624d3510d7f94838e54af877ca58a00c5a672bba11f5aa1ed1980dfef47b9973d0bf456ded5e72f1702b3dc5197fce39cba53a038d8dc0ec783ce70577107dc5e8b299e64a0b7f1191f0926bd25762370191710bab2f44e9069f55f8a3f87e4cb488a2fb3348c0bf3b3874291f83e4776b160ea73aafa3919c7c069c73c0052173a63158db8b65541d161f9c964926ad7f06bdd6cb6a32135b04e35701c2e13c49c1f75dc7a25d623378860692d172ec3f1e1f2d9dc77c015c13721efcb101c2390abb847e871132f472a37cc0163b39b1d575a5444e246a08a1afb1a696cabab29498a314429a3b9f44c43ba29f71fac1fbe0d01c3c16d22730932704bcfb0c1b7a432bc51dd3f5dd5afc3b342cbe6a6ff899039e28f9a51881b1d46fdcf31767cb6f5c5c69ab3c80615d77c4d1664fc4ec831b8cea2e752bbb7a9ce79df875b29f1e232751daf32a1a0c4ff8bd0688e2b8e2d668b8a77e20a9eb6ec2e2c23b94e507baeacbcfa31fb6e1ca3343668f43e3aa6d85e7c29bf0bb4dbdabddc92be7f4a6f5d21b19e6da17bfb6cc926e3847532fae29c7b62fb909130ec372d3c16cfe6aaf3ce2af0fe7610fde7aad61bc80d2f96b999c8ccf6d22cf903ca8ae8b879ec4a416f334982e9810c0140a18d4dc81b5edaae23e9f4abaf40ed71512aebbba5bb251545e188db789558a845a2877b14bdaeec3c738b7d730c0860531bf5517d4f0e8f95ed3571f8a35816d5116fcb8d7cbf42b7d5d5e65541508c898bb2e0fe96297d2ab7135662de39df099ebaed5871111f5346278cee5728cec512e6c0a0d65b51e3d627873195b84103341c2bc83b6c8fdd8ba17f5957413f61c69d618c9b9d0b1f08dc81921b6c662ee1da3bfa019b095e9a03c2db4d645ccb7364e895098cbf7d932c72d80663c7a1694d122f7348393079223c11d36c64a5856eae0397ab9a9d948204b74e56525a9d552dd0916de81cbb5af3c59b3d7f8f9154423ce2cb45a5bc808e24bef13212019a19545fe54ba84d01534358380192b8c7b0eda907810375bb66a578a58fec392b47991271c8367b91d710e8a176bc1a4e96f0e137d4c25fbb03eddc392f9f170dd744472b864fbbae7c93d86e682308b21b73c5652065d72cf02e1152b44024a90a3b52eb0bb3cb412e518d37a68aa4c7f46789c54ab30d3a73d0a8712fde612294cda2aa1ccf164930b9b1d17801d4fbb06e849d39bf2b5141330caa0d2618b616f1c67e1ca57080e79ed9092ba7a55e8121cfc825cd26a0199a479a7ab1b7b23d2a4dd82fa6d04ee41ca680435efc934f0451e865e8632ac2f1115f4cdd33b0fccb7a2326127faf20cba37c828613dba5a98f4e1ad25eb6b91078cf73d873df9ef91531476f64b83559ff7ccdc4c070d478b18196ea05fe8d4ea0216ee5273dfabbd04582f40f064c9781afd2cbf30901f28cd09cc934f1b2d50883778274177e3dba8af0a1b931d80ce1a6c4085780ea2195b65ecfd2953f78a5290fe560d0cd6a5e73890a5a82dc410b92a3ef2be05ec5607820fd4ca6b9c3aa258d59022fdcb21665f1ce4e8aad8fd918c43bd3c2afe3dc223ff9f48831d401c8b6996190793d1dd7551f8511b69283992398d8f9b4bd2b3398d3b8c6f3c5d8b802ca5282b70242df2b7be4b38e70c3065f8da888631375afcc05ce578089c4f783776b286b7a60d1b5e189e2742a3240c1036a953d886885422eef01413c38099b64505fd5a73488acb4e611820674c58ae74d6c64a885d4beda9bd7903bcdc71e3711e2a057c0eab2100c321050ab14c6e453c53182577ad3178603cd9afde40a701120e9a36074fd582428c74e02781318e6c65450f8f020bd22475696fe13b8c59260e53a06d16eabd135e887a0a6bbc8ad21be7661df76fec5b13844f68b8eed1a7379713738beac9f23c7a26520e19797a910cde9fb285179526889b908b7eb49bb06f70f6271fba8712c1a4269e0600000043e924e3d2c4c753fd7e547d95841e335179836f76424e728810d7f32b78256ea30c79d9238a6588426e1f2d4c0b03d5605bd826ed24f0f11326b4cf958632b86e017aa80e142db1580c44f76d9c98196f3f6852ab2bfc6a01a3553a130c2d171957f5a45c3550fbbc990ef8742a98a86b280a57b9f198ff436bc01161ada50e6f23026c3254adf2321bff7e20aa54080bbb57d8d52c6a6df6107706a2e5bc6da68f17b474c0edd39401d765086e885cf7992405f856557915603cbe8894676e996bbadbb649a5e7498b91f9bd2f697dd9ebbe4d386050258b9f4c94781e61c660651c3f1e3ae51f8c035eca365bf15d6db48ea9ce183515f4a208d010f7c23dcacbd6e225490d7e9c133525f5c9018d752b21b4897bf18b64b6a9936f538a0a8958fc934440aeeaad2b68ac844d76f0900a6c95bd0b353d85d4fb62eb88360112237fd8c636a80e3130b21d66ae8ec58a4b76cba0602f96da919f7e84fd37e3ec2379f58e389a39c78d2482e03c379e3c4649ad63a76e3707ecff07d2fcb0c9dfc524cab49e69a09c92e4f88714335cb57d3f6184d07bef9657280fb5c9fd2d8f940f7ac6c5407e3077aa2e4ba8e217e0ee19e302d6d90e3be05a86dade35d2e454e511afb5cf5936f1d11f2fa6be6ceaa817dbdc7a6aabf2fad8ff3efa8382a25099f0c5989d2ad56ae0f4968b2cfcfc67b4f1c161c75900b4848f59a3c0376dfcb7997bf28e9e85d6dd942a360516de38e1c1a038a796f9a77ff2b0c7e5e8f4932391a0e58e76dacc6f9764178a211dfde3e75d367d2911ff398126ffdf83cf2fbdf1ad5232bed9155f7a168638a572094a9e934d4969b358cf6e121d7fd2aeae2f499068b42c152f0e3403a230885d6f92f038ddaa23499f804ffb06abdbabb51f6c38c92fb1a6271a4b13d6d11125b8ec12efa5907dc65062797fb9cca15e2f254e76b182d3fcdb4e96ac4de36d6df7e7bba5c32f422286b1be3b79bffb6fd693761952d195a84ad9ceb07287a0fbefab9e0347b513c5f60233ccd4b52d90ec144a2f896d9dc7f279f8aa93038f3efa286e1c3006933a4d7183d952f8d28b141b28b2af355b5bd8198dfde1ffb8d09202aff0d16ca3fec194662892a49f829813970a4520f1228aa03d211a45bed3b2e05bf1f10b1a152761e7b6c6ddea863a3c02224256092c70ca70dc185c4c385dd98b09e2682661e1e66f71d9c4037048eb70e8a1cbe57de87ec43713abf5fdcf63b9c482f318e3bec37e878dadbae15a02d731e6c8574eb14c059d72f73be5174add786d06b585a28a06d349d8e434a491b34897b3c1ad786ec8280d7f57edd4fbc6aea5485d659b59d393e331cf91e6ed76f340fcf7cf460892fa7318fc42b883f61d888ad982a751accb613c66661fba5f3d6de751a6a9ef8a4700316aaad04e991aab7903f4ef012ec2a8c092234e74ef335daf360ae47bbd2bbc6ad8c1a4f81efe8bbd703cb55ef36b32b4e30cb5a3b165c02ba295d0e1c40ce6ff8f479a74f01275f113ebfa8ade37a59ce70e6ca2a6f48f1be085f61bf772e2c2da523a2cfe63e99c57bdb1ff23139d4fca49eff7547e9880eefd3f7511a677efa23b52098ba89037c48dfcda2e8c1cfb9f892161049e53f8cee55256279512aecab8c441600dae0fd957883273047cf5c66ba209f830aa2ce0cbe41ca08c0cef4aed7f4324009200661a7ce680e5a8df2d051c1d8b2f63d25d8d74d05c75c46c8f3f24d625539e63459650960498a54ec3b16225bbbf4d3930009df265839d72611f5332a904cdebada108236e4414a2909ad01ec44b9d7f75de4385ad7ca5152e890a0919b3639fd1bcbca3b737ebb8d9ae541b1271cf2166ba15830e66f3d3afd3b754a7f81ad4f0999704ae99c114907c5be4a4797f13b80564f234723a34dbe137dabfd7fa23562df679f54a6ab54def6d63deae9844f72fd73efd0413551f5c4b9ee826eb3b7faf92a59ea34a16723b4fea14d1c8815a4e2d39fc48d1dbce526a7c53f5a96d0ef6463a0cee73fd3505f5c764a264b83c4a21f80e8b61c82d24442d13da99d18dc1b2538e7a510f6093d9ef2bc5cc777d4f98411e93919eddfd69d6e20d227cb61c50f358ea227f4de941fb080c1cf6b1f6e25533768fe133dbfc3f9d29c603bed38aa3c5af5b81a706b0067b40b88f992610d04c7cc36b8f649697cd6a93fae51138161891ae75a7147780fc59af5a6e18c54f9d2a4fe7fa92314b399afba9a40d0cc24f70a2593acf8d179215e06b7a9a88224bafcb2cbf60caf5fe4ff38208a70793b5dc33cd572956260e1c86312d3ba9b3a4b2b44376f2e78c616a6c0880ac8dcbaa30b9f761d500fd03a8518dd0509157b184a2d95e0caf3ffc8ac2db6c54d80c71a1e5b9ea3bf51071e2118af204123daceeb04e4f6f31f32a4d3fbb76ee49440cabda2c121c1b99acab5b87cecc37c3f9066af34ab29d6598bbfd91047a2ac7ce3a8f3027ff5e6d743506f161087278896a98ed37122ba208b61cf54d3929555ab06b564cd5e4f46f4755a6cfa2ef2b30d29ea66f2749d4060d411fa9160c91b6f55cf071ac8222c6313df18759e2958cddfe3db4cbeb9cd39abcf5f0beaecae8437813995cb7ed0b87d42ca942ff7245ece204798d01361c5f008e0d82bdf76660515bc78f7f8f409ccf68614b2cb50f5af2615661326fd971bc57eeeade60ea906b8df1cb0dfafd318cd2c396309c329d0469ca192aa8f51d7c4227685440f073983255baf054b97b9d7be1d1470d7eabd5c09b2116b4e86b0567b7e97e088717a4fe3dbdd310a1c39136ea4d2c47492001f9885dba03bf97e7da376171d666441cdc2f999db137603d57df32b4260fa0165e82917bb1631ea314e7a7437e66fc68cef22cda8f456d6e583f6e3237e0bc79987a9103f7cf0918e26881f67ea582e1ff3a49177599d385bf6e42572a2547933aeddb826530e9adf30dd84c3a7fae5c4c26f6c6f3a9f0906decd314e2407825abef959c5416d18a92ff34e6c521a16e8a0a29937c77d4ee99b41d530a732acbe0bf5d274df9d496b47a9a624546bdcf9976cde12ec989cb2a70b33a7c8a3a77652023164695f9db30dfcf587f0cd4f73e385730bcbdd688f6dcb08ba0efbb9f579220afefa4acfea522e864fce9b1782ce9f14824d16e9d33a2609c23ba3c5a1af02549357a0dcc12e37819d778021762cf895abeac1125b744c8b8225a091e7be9ded9993cfa3ca9abb83e25c8f559009977a2ed9374a89619fae5ef6d164bb73d242004dc8428e44689b33ee3bbe88bb4962ab0a32a90e7aea044f08410752cb2d7aeaf3196648a3a99092665b478bb394b48f79b36db0efc7f50d6a5179c945f5298cfaac5e5dea715296f92abce7281d48a0c9c6b785a35ef5f1697c047ddb254fe9a8ab9f498b0c1ae09ffd01a3d8d427fee7e36c51e0e5c2fee2245fb8464626ab5c9857ebce91f7d22bf024d10c2d71021cd69268472de419e6cefd970cc3a8e4d1bbe6496799aa7f100411766e712aff08b731460f14f9d7356db12cf8e1c6121968dc68b1d81c086b325ca4ce6fe1f476707e08fa913144b757c6be17cf93150db29544d207f09a896f33b7335d9339215da751e7af2c6bdd19db6f521af2c8a5998dc607f97026d07111488741134c1c86eba123273d1fd5ee4b471e86f9ae9478a04c7482076ab34a1eca5c64f89e5106eed44bceec019c67c12fb4db4fdac153f4ac3b63ffeb6d30de58ec039e2dd3c181e254cd94d0a2b0b44490384cc5915b54ee1db2b6d059879bf8126c9ca976d0f7862da07ecd350930a081810a7afd72b2ad3f65b96ae9c7f91227a2b5513a559f36b90fe01be9ae5ad3ca65e2c26f358fc26b858a3633fda7ae49a5fb705220a5819b3cca41b1ccc21d7c40f5fa9c422288efa5394e4312675899d704a2aab62b8363f58fd4bc12a8bea6ffc45b4414237bf5f019321206dbba439acb5ef26641f30fdac20f964354bce94e4c9d73e137f9806deefaf6f4acaa0e76ad4fef9f6cb7fc01bbabda9612c05adbe46afcf94819e8a4b4b49ff764784fa432d47fb6d4230900043d1b4521cd6839fe8c5df4d1899fdfb13880e207cac73f0a29020bdd563bd9c2f6bcd1ec523b3e03ebf6164fc65af001830c51396f9df2d346f83a59cfc82201cf1150ea57259d579fc2ed199b3fbe42d5188c84e4354610743e5b23a265246313cc63913f17412fa00d98b379b80b96d936969572e11316bc8926cb23115186f3b2387b82c3898fa41bf16a308da62d5a3eb3609af1943fddde08a4036eb2a41b7292caad9eb082614b02a1fa255bc7abd4d0e3b4ec1801e131e68c7aa9da1a0ff10f9de87dec8fad1ad8bfa99caa49e203a7b9c33e044d4544a537471e7a452468b821959bc488c6b8cbf81e90081a26de273ad1203cc06adb6af242ab19f96c1c66b58c37e2c9309704fba63af99a8d9c5efc651afb631fe9f546b938cc3b8e526c4159e5c9f7afb29fd1d55fabf09367ce2a63a35e7a2062d1c772ed981fd77157a847f687a177cf9886ce41df8cc509302b46bc1e2ba896b1c1656a1bbfdf4cd9ac39cf8510d1c823075f16550fd044aacc8d42a56f03718f7b18475cdc3999faeb25ab3dd8a807ee04d8e5d831d08b4e309dff50330685138797e10c6362636f53f22bfc1f3d5090a5d369282d9de36bb4e2505411ccc6ea395afa1567b15a2fb4be2adeea7126b1a8e80034105e0d98bdd78e796ce1cdc06a4ae666fc0baec5c52614340ed997673e26ec47c88846c000bb7c9077337cd44f5c041fdcc64986e5e1c0f488148f0ee6f842c44c0b72e82109270341bba6e9080b70fcf930d0f10be5a36798e70111fed72727b72282ff164fc08319d74f1f57cde71b57cb397a9e753f87b97729bafba017a24cbfdee5dfe7fc296c112e93bb8fce560ca80a3afd8370baaa79ad783b51352b5440b144a47378c9ae22eda5794328e95bcca220fd07bb56915529b155c61858efe89ad36a79288e74c0e251addcfaf797432175a5562b46eff5e3aebeb74623e18beef85389383c604d8884431b07dc4bea0174aadc337ff41f558a63f16690feae47efa2a5d1318b7397e1e4ba398727d286791b71610e1d78d32800e7e113c12abf0f60b6ca4401ecd23b7aacd990633b2b017daf6bfef1b2361ece74b7dbcbb1a73d4bc1f9d2e5c9fb0b7980d25cc44d1b10c09ef5a6a05c84669294a5cadf0cd88ab449f9f0bcdd8c48590d416c5c1feaa494a2145949c2a3373df7c6014225f2745bbeb20ff294d22c0d96ca111e6926946207cab56a03162a49e68968e398f70690188ee3ca847ef421742d60b9a6ad029e8a3d607950b2bf8ad8ff297cb39acc94905635770436e134435e28205140331b5100d9f64469792fffac87bca0835cbc617446ff86a7b50418c305f32e658b32130e491e38709fd3697017ac8084cdf1ed81a28375aed092ab4e32ca88a933154dd3a9e99351acbada926b67b310c7070ac1a414a28c5abfe1f45476249a12f18ca2d981528d881ed3c5072e46a6eff3cdf37dcbc89c7f79c88a1f8d15d15beb66a0e4440c7b93e379c4e2bac1d5c8e85f1852887e2cfeb178fba1c67dc2adb0c87df8ca4444ca7f455509f492effb5001328b8cc696e2933207a2d78bbce8562ca34a248193c914406b161c8141479d891b0c6110ec1e25cad38299b489f2ec437017cadba67dcb58abd4933c95b3526f1d4747b8701a7d71e446e4b62e2941d4281faca0cf22914be5aad80f47100000000ceb24e82508fe55a92fb6db70d03d1c1ec09cfee31639341756a4630a0eaaecac7bfbddf9d30c42cbd45eb181d5bd341307ad26f496bb042e2b655c03ac3dcc587acbf50f79b5c239be9938b62d3251b199f8413b020605d5d0552cfd9c39c9132719d6d0a326b000e12fcb51bc274df79d11430060d05978cdd50583f1bca82c57dbee605e2d00fcb5414af13a596d35cb5ba62de6a28cbccc857d23547b1c7fd5ac8fbf6758d5b8451fa46d9acc00344dc2e565674b1dd3547eb8f8aa5fff99042f8d1d59e6ad2f53379211e6832fcb68f5777eb2db85b28f724f4e4ce6342cf55713ff7b0cb4f7f47dd12a6566b86709eaefae024373267ce72a89e7f3e42ab48edcccc96b5d0403fe93a927e5ccf470014f220b8257393226cd7b996f20e6a34f81206733a9fdce03b701943c1b560d3eab68c2c225cf7f7f2b56123be2bb173e9e5b37f4d3348f6b987764ad07c2acd44514ff264d7eda31e5e517a179414841ad4553d51c08f435e05f10aa82d74b97a9ba3a133e6c9175fdcd4f3dc9c16d3be1d5bbaf13240177081ac1d56681bfa988a93af09868afd608520c0bfd71d857a6661fdaf6f2e166987eb007449dd26334ae932c5003fefc0f983b9e49cbfcea325f2de16a9ae935caa46f5b3433957fb370971ed957f138f08a60fed5b84995e428e7ae7d5c22021ff016baef0e713a118344c016a99ad469313ba7f2452da0dd82e019f64aa229cf80a69b3e08ac5847f10d247179855546313232f23e055c2f74ecef14e0fdcc29a9bf0976fbb249bd5c7903183d2a53c70960a183630e7d4928daa7091a85ad987d2a4a5b8f6be6612fa72d9fbb33c67bb38eff19f2e784f94e0354cf6d35a5b2c62233c039de3734b38e97ec72bd673fef09fd56fec329818cc68cdf12cb52f7d37a8350c16e94208880bfcd3e895d7aa4489e3dd15db4a9026f0d2a46f1e89c35845dbd976a1992b87c15a0c7580e6424b8792a7bb7b933d7c5433d4133ba4dbbcf7995d6ed3feaa32f876a287feeb9cc6107778c1f83e0119d980b9e994c2a3ae3de24a103efb3cacb746b49d1ad85746b233ab4aaf0e988ec2a786bc93f32040d3bdc3008031634cdfded5ac95b2279e096243228296591e7ba53c4a127772cc4620e6b238ccad250629194533d0a669ff3366c52d64928693e0b0cbb0b8e2c6029089d4dfe2b4b6c5dcd85f1a02770611e65001e48a32a8b0431a3b9d77fa3a95be38a0436a704c05a8e0183f3214c25531a63796f679bf72885aa766468d42b2543542d7e82544efc5c5e81e6a91a0f5d4e68000cff687d63e45c9a11d4ef515050daa592c9a828ac7c0488e7cdb3d6fdaef5e9176ee68d981ea50d386d74df3b40660351736deb03bfceb721878cf9894b0302df15964242ab6b9f77f98ba1c7993735983d2b022600ab74a19e3636e1400d08ba45d3a5c2774cb06a1c358bbfc11d27efaf7ca53c2e7757c8c76da24707d91a4a5244262898d68083ff91c514d9b9b1ebaa0cb0b10254fda1b1e82b9a1a47f117b5b280ddbec1f6732d11117ef1a7a674699df87fe795d1243cb9c4527e364e2b711b6562a87fafc130ce0baf1701686639b05f0c8dc708f008b1e6ab89e8d623bb83f3d54b7bcdbdacd055ac4eccbd36bbe0af0f65a00e3d6dd985ae8851d176976cfb5816d1fc2a63d3546aecaa4e712ca6961d1f181315d553de6b53485faed0dcfcf819a1ba3badffe797377d3d1ddaed8e7a0acc0c3d277762262a139f94de49faca167b11bf04f2104a5ab9a73367a6461f7124c91a2c4229ef98e6ebde9aac283c7d029400d71293f488ba169b62c1e94689cf5b248ed4aea62b88d65bb764cfe27d5231a58486e7381df518f4ed81cb905108c54a5050a94ca0e94da20d3794bc5fab9127dc95b6404b1e27b4e28136fc27806f7be798444c33aca88ffd45b860eba0d5033839f5a092863954604f1952bd61dad23b11643fe14f3ade08116aa2c13eee701ccd13e506bd65a1060bf69579aea8c8143cd38c0891a3065f251eba0c20ab9c69ddf28e3bd6400cc203bac8de1882239ad4e1b97b0ae2f1abb7bac7c0d8ef82b97ebfb1f5577f06a3a1377b09ada4db87d342f20ab0eca4b9c206042471307511429cb57a578211f92d3647189861cad9145f5eb26ab696abe50a2a6c1b469df97da28aba4e79b586c348a430f5ea61c4be1032fa61d18581f05a07fb8707c8996e0fff1c3eda59b992687fa12483b9327e10224b20d42e8b3fc4670bf070ced602283273d6818acd1f6da567c44d3f5e1377065d43d87d889843ae48e7fa8ba1634815695b8c480ca271e6e833799c70da80fd79acc09b989667a2294de5da73f0363df9a33ad4dab8d27cf7bed0a06838672e3d07d52b6396e9b5576021d5e925abd533bf161c944795065fdd44e8462e3070c479f1c118276653488dd9b2f1a673f8cad3612ca1fab4388ec9c8f834a01a499adb7b3a9a977672f6d75b41bbdd7f91ceb7e7a88568d17bb432be9e4e96e115075bce197ef4754d2914c2c59e2d7f4c08f0dbe34d31f229428f211bf1d7e8f5c319ed4a8273cb6255eb318851ac4557b0278fac63107a54d407c42f300b843a12abd3b893b46c7efac2e388ab42b87aebe2543bd4c15f459bc50aad10ffe1c1196fb52c26e54bdaa7fbd52451f207ffb073ef4b3f71eedd7da40c89505019739e3fa733bcdc84ff4919e8fe2358129ef28291be1d6426b8bafe88463b1d3cd7273745381c7f65221898e6ad361e88b24c54ccc7ac9a830145b6dc096e2d71ef71ec4f03524cb870b724e08d223bdec2f6fdde6200217a13b5136004d455d66547f5a1793e0cad85677d49e5c558852107007c8136812cf021afaf6f7e8f59883371be46cda412dd9c6fcf187c31252ceb5758901d39cd5355ab386d9a7fe6ea46ebf277aaf809c3023211ea9aa189de4d422080ebb9fec50ffab6b95ba4ae5018accc497e79149ed6047ce561ccc10e9194cdccd5c9fb75175c8dbc9d0a916ad59288f010defbbb50d263041ab37aac0f93253bef6f898cd0825d99d27224f26181f9713b8979da64756c95e7505f25a2688960d6155c3613dcc31b6c337a6dbfc6b12cfde1db22b93bbd5e48534fb0bda8b212577a14dcf665c834b0bd24e5f624d2455fe048dbe930328d7cb632db3b0e244bb5d43390b420b15157a339487fc78976f867d3a361aafdd3f50a93c01882da7c220089a544381db22e2c86b228dc2be01820468460437588952a549d37498e529e62aa62bad1580546bcb1e9a6ed1870b7838d05d12f6e3a041e78b1bdb80894626f20889ccb3a468aa4fb24b9c87cbb28623ce59c6b3c6286db366d08004551a25fe4d8d194a2bb7c52e1c85a5fbe4cb15b171489da121bea1c469a6bb185d63213084e3a81ee54dc03a94dc5ecdda7bfaad1df68021aaf4627c9d529f13e5c81b5ee4dd228949ca16b9a61d186211d153294470907557e5e14ae665013f285fe4d3766e7b3d8ce5e2a14692072d4d8f79354bcc8db8a2a36c8bcd", 0x2000, &(0x7f0000004380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000066c0)={0x90, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x100, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r0, &(0x7f0000006a40)="babb1507a31fbc348ee315c3ba98920e84d970feee36a929bc713e040e8d456e0204985416d803b31dde8ab1721d50c3a44ddf98b62a7b7c319a532aa8be977b8c194e7c49d815639101f170bc6d109adf1086fde5abca3c62bd22ea5537790d65069ea80094be74f190576aa519c071ab14307258c0a7f631c09fd51bff58425f7207fea5896e44b904cc930281abf23e9a76f675c166e2f078d1b20ad462bd4229d4b41b8b1f452336fd5346fdfa4d41659ac1e830ce8734288d5406eeb99e673d9ce4deca34418c3be31cb0d409a3391ce75dc677d5971d7728e866af6413592fda7b4f874572ed87354e2ebabf8b952d184ac381c96620fcc2b080ef9f03c2abdd00f3600de93f8c44095ae5e2f5c7e586d63a2aa7d13b5f95df8e47179ebc2e74b624581d5d4ccb1862b4f75eb78b8304bfda9e029f8c9157f3e0ff59a24a855a7baa5eaeee43ba943522675a645471719ff891102a8450f08b2d804ba463568f30871c7d28802e5adbdc53e86d1b88f2b88c888ef3cd6a89bc6f0c1aa7d21b2d271efc8dde451ac7b71409abc4469ab0d1da719d3db382824cce59e3b1b2e0feca1c0e8ca311a5705634efd366156c2eae11b31c7dbc7b4dd3b9896b9d887d513bff6476623e930e96cefb2e481b90684ce9b5da88af3c4790b63cca74283430e766afc6b60ef76817bff164c5defda293c36e95b430c57fdb7e13a2e6d8cc39d3f89126edfc35f5187a2a64e18157521fad4b318dc495b981df2ee04bd5d61410ea332b3be332c8bea7b170f57c5bab95eeb02837db7ee826907ed6bc65404759973654da1a282c8c5c4ebe161732ba3b092b71508aba4450118281151f697915bfb4c69e0d9913aa24bf8ecf7ed4547e6630453a99be33696822c1ea71b3dd08908f3cacd2571bfbdabfcfbef4b1b3e4529a78bf7999447075ac8438de9516faaaefd52f3fa4f33fbadef3c2c139dde376e64bef60348fc68eadfd396db3152e42cf270d0d13e6f2ec79fb17b1b8efa9fba65aa823dd682996263d8dba238f0dd557f9938c7cd04912622f080f9f2ba5a9cd91b62edfaa72ec22aea7efb3b1bd1fe2b4b8ea2d18c5d97860e44b728e2204c7185a168989fc0734c9cc1e1e3c31eae28cbec8a7b26955e8d11a67bd33db88bfcb48b30c1b2e6d0cc4c92456d6fa1d342216be11cc16e150096cea7e8b0ada619d75d7ddd8ac7bfb5280c1f533ae9b1615b1dccec49f35f47849faa640b43f678601fea278a1f23c5d4bfef28a79d6848e9205b120e860c7d94d6e7573b8a6932fc83d294bfcfb33621a434e2d5e420189bc7a0ecf67d7d010d9aa50340f8cba19597f303020c00582571850696400f40ecb1dbb106c19761a18c15f6ba2b7d0c2f57897cf55ff0720cd32dfe00ea68985a0c2ea947d3241eb83286bf4697f7395ac160fc89ea3f513e2e90d6947b43670a35b9f35de62c088c3131d61c3713b6070343800d14f4415e8619cae8d867a2957ee242057f7367ce45d876a25e6c56b3bfa0f3869a61f5dfa4f98a49a8a4e76d9401b24da20d2d1a3c7c6ea9969b3e852db3ded4a298336e1392452849c014f99aacdf653d7e0dcd3d81415e1f9cca3d9469550a3cd153f4e1f0fb62be86ba36934c66120526331d9a6aa877829ffbb6a11eed8b16636843f8eb5cf0beefb6e49f16ab5a74aba4a7a4cfe8a368ab4511377bf5ee0ea59e530432365f4c3525927f293da54e04fd5002b6dcfd095462ea8895124798edb618ccc9f68fc32f47d954d9493aa14cfc5157ee6c332a91f48fe39075b0a29b779c9183e659f5854a2d550094e837c97b7d41bc6f1e02e0025d1d8ea65c48c5ffaf577284ca39399486e831a2aed4a4a5bc6a15146a934e1224c34564db67e34c43708ec953f7ddf58f7b7ca594acbd6286c997a3e4e671b04a5b8ea8d11fcce7ac1567984097c1d6bd37ff302c6c38a688153c746564bb45c652333c9fd87a0adfbf2144500c3858b6b81f8ffa58c9f2fa70b53ea3eebb3b456764ff5cf2c172d56307ca5a5ac4b15797cde04b9016fa36ebe1ac0aa6c8c704526c91731a39d3b0b6f80ac254d9f652de23b5e94d463a2e0d683d7a55c4a5457c96b35cd903e9ad3f2b6e6a65424d9345aaa3984406828d0023f570f8f61bdbabe99908fdd77e90964ac44063432dbc30c086f32db3a9023194d4df15a72ad220581290e89ffefcf25842bf2d43dcb438de8577e3aa678bc55e2ca0474568ec00553702af46b178da58260ec33b982e537c9d380f769b8eca3fd5614b3128c6e068069fd40deb8117a03c1f384d8bf5f44eec9f0d285928ddfb73cf545dc8ea00b80c4520ad873ca1d0155cdd0740b4a89438bc03404850a835c392bc52ec1867bb961a5c5e9997e3fb0ee748c618cf4719a2915a2febaf41d1b150e58959ef0b669292e3d3750dc92109e5cabbc251a121c1cee11807113208561a5f2f079acc332de2ca914b1c2ef8dafc010ffb4881e2b8b8831c218407e7a2e0fa50f8eea22325b9fbbc4a7b686d14b460afdabae247441db4927f13607eee2cfba854652826be9598bc16ad3477e421144b499a0b6e0d50a5d5eff1a3cf454c13803e55594b261e5599c33445bbddffcf8f1ebdc5599fd85f9ba81967469b5090b7cb8bced92d4fd377132d12b099caf6956e7dd785503e694f7b3d3d86be3f0f3a9aa974aa9b25550cc7a0ab62b5bd08f8d4a11bb366d0f9c669f151b64ab89aff3c140a1d7f909f5f83c8df7189cb60b1e267951d5042d7bed5633f87efe5590910644dfffac26e41cbf106da125912cc4681de4b92fecb9a5b9a4a4d966e9110721484edc1aa48fbe7b63286585252b7d5cfaa5c2d86acbd9bbbc15dacc9a73c5562ad813fab89f5e1848bc231fdb5bba880ac927ec5d0e5f3366d1467bb7d27b43d2783ca5e478843361b6b4142f6e1fb3288de0ffbebd2ea141571f249e5b990b630bebad6648f732f2d0239ba8e612383fffcd37a24e826c3584b2cd6e5eb5aca975e528dbfce3c3e542b86fe93be63fc5c55cc5b037c8954c1f79faf6211678ed5ea2638de583c7d958035eb82dbeec387fa128edfcc888d0ed8130d0261d4e50652b60617ab3f444977b51df4331d8f90a7457f173aee5df8a4d2d50c9988c2dfabad2440c34fed036ba71822e4ff14b33a8f07eab77aa9ec8aa976a6ebb64749ea80b3ac52c6fd6a6f9a6375e1d51ab8cd99c4ea915c9ffc061914a54ed04d8b307689d546558fb6d034e59fbffb9c7c501289cb659523564d2327870f9ab3f74f25529955f3cc5766fa32674f79656ee952ab664e99853e617590620e7cc765b6b0ca9d26ef091cf06df359d0f222a8e9673de286037b06dff3340b875fd5a725b6cf267f539f206cff8d76c0964d11db6c17203ee19cbd42587296e8139c130aeb65171a29cdccb618a3faabbb72fcd34acc0ebe59e04ceadc597bc131380eae187828a2f0de48ecc7e28c211faa3e962b05a1bfc4968ad4d855c5bfbeec58bdf728f63a68010e827fd96a6b1750582fea0673bc007d63c1aaa642cd9e63bf5e6fd404a268160ca237a26f8b9cd1faa0bb8a7a064428b3b5183562b1f5ef28386e39247e5a3c1175d189d687a6655adb734e38aaa98517a6b59dfea024498c771280cb9756ac0d789645f3cd9178ff8a3df0ecf4e04e09edd59b42e9640e4320939ba75e04dc0b96b3c85847de1713933d6d8838e2b066b9ba052faf43afa3d894e133d40a9f3d48ddb8efb417fc6815eb97b529a5c0a398287cb53afdbdc0dc39a39f63750cf7fe855f64922aac6a2306d737f13e3f4fcef00e6d8b61ec21b7b9af4b81ed86f276956aba9f452134e2184d505f66491965b3adcde6ebb6f89113ead3edfe18c211c36c0439bc1b321518fa958f8f29f89e31e1fac1f9ed3a7e68b86eb039960da9ad2d823181166dd1dd3fa08d3f66ee2fbf4a0444609324a0b6d335b95a8d9078c31c68803186867da7757412dc52e0e44ade235f5a8600f7ffc4017897acf0bebee882edb4d7841b7efd3836314326b6ff4d21aa04db53803dea43b3f25aada4515b7d17f41cdbecf58e2cf3fdf0d214ab6907288559578a1d02a3ddb8a980abaf49c52b4bbfffc6626056d90760dc506054c88a680f4b9d7884edb8e5fd27adca9fbc3e905ca71387aff238e8a37e6d9ef75de15990531afda3fe170a4b3fadb249df6fbe0ad598e5ac255efcf456f5aaa0e20a64fc56eba14ebcb3ee96b608f33a7e64240d9264a83419b57abb6b1a946a5427c5df162d8a2004bf5d5bd011423c8da634e6b0754a6766b8907680ea0318eeb3699fb4865a05e2915b7843a6123b6b23eeaf295fb66892fa4fd56268ce98cc276c9a448d96adafdc13dae550cda5393aafa2b5eb0e737001f60b7e9b6501a611517425e3ff73afa05c4df56e595ec8be7c0f8c1f0ab7f087dca60fc5e9b40d62f72c453a261a0c87300f66a3ae81f0bd8de024dad855bd4d62c04046499df9e974d83712472df7bd7504d97296541269f36789898e6579cdf6ffeb0d390d79103ce37d3aaf3f0df714e44a3235f74f2bf87d23907875dce0d76104e9b2e1f9231f51e37a8a29703fee3a3d24ae9a54fa06dd02428356686274922ede85a8656c21f4e9cc1847a79ec272a9f069f8fc7ec43ff22cf4b22132fe9d1ad01fbfc7ff92669e7a1495e9544f92fd2644cdb833e49e71ccc3aa5548ea74ee0753e02256dae7304d3a8a46810311e735d4c2d28832aebf5d783c3d3f060c791732b8772327ea211e936d23b9a803b51bc8f7333727cf5603239000ef173a6da4a86da3295190b042e230614b157d1ed2d242444ef98da9fcbf9a2cd8da10f3b181c1d14b339ed8249ed9de44fa538eff2ecc8baec0f8e3b61f8f643900abbbc8bfc7fe274556f7c763c2196c18a4a43c58a6257d3d18c072c8dc22fbf7f708e59b3d1fd4755ff740a32c53958a681ca433781d34d30f2845dad0f27790ca9aad897714cd09426a8ac7610f5e6fac3ff96e41d6f5c8c908617c0a80903230d048e7c7da560f275affc0e2d92b8e2e3acd29ff1f760a67ff841649e4e6489688a7c736d81d204b8a230b706e43ef908de131c24456546d4bd881544fb13c7e2c7b9028faa85758cc397d8cfb8a8ae61dbb43c05ebc09d85f6b860a25c43028edb834a7baacc6dc45a00906216c576ae08fe0039181c88ae066ab752ab11077e5dd6bae79a0d93e1b30aa6f7640b3bf61b166bb0c70fde979e6981eebd45068eef400c4dded22e6ecd339bf3fc076f61a152778867a36c165f27f5449e612286a8df056192c998242f68cc55362fb6eaab7678beaadb4aa2adfa65069b665caae56422d61820d1a217f73d29e778c6a3d20f19bd1183482cbe8e0412f065e4aa96906d75213e94603b7a07a0195848c63163036e3d2c332b7d365add3a09c8317fdbf13123ed7edd279ad8679c31085cb37422c30defa328e0d8973e2e2d61e6f0389973e664b4e39541028e30223e66e96749c97ced85985b0eb9ecfea1795b62d6b1bcfe112a84273f17f5e65572d4f3275eceb9f4b48a9195a6e5f1bd145624460126a6c68f8c82af0e2063dc2f7bdbaa03e36bc4f889b937cd79e7c4d2cd6a469ddee246b1f081d43cbc883e80574b7eb33fc05ac78fa00633a9e46fae49ab282caa1d80ae7045832d09f5f5330fb4cd034a512ba337f0290b9ae3d73ef102c8948d72e3c9ccec9a974a55419f4c9cd22cddc228ae0c030fed80b9f234832ecf8ffc3167f2c4a3fbaf9ad47aaf287021f2c449f2cb9b8cc83c365f98c8d61fe53401b6932ca735affb9335e08a9374b65cc57f53df023bd5aaffe1a9dab2344be56e93a2154bd457e98c2428f0607cd45609d073f43bfa55ea0c92533043f565e4ef2a6e6234956a3b4ca5e185262e01c8a81ca59122c68cdd655a70befd516694e0a0bdad57ba499b8a23eac5f269416a468ced9b4d1598f40a342bbff734dd3aad68e151bc21920685219626ae82a74c899f80cba8a8e17698ff8bcc5bdb96f95d0c2e1f22903069496f5b1eb648ac6145c6a52fb5dbfcd6d81afd7491e56fb49e57e40c574196206fa51fce5a076d785c9c517b67366d89558f5ccf8e8ca8200baff0977c3f9e02e9882853d5d5a657f69f9e7d51ec983f4efcf60157077582858ee117fa04591e72661583744d98a4dfdc0035d9a29bb597fa928a70f8968c75e550f5f6f978fe9278a84cadc24e08f7f1dbcfd4dad86ad9f209d387f0ea4a784765d32fb501f60464da1962a6f8d4221c5d9adf6bef4776566e1204012033eb959a82b9bd9ef47a9762cc72717329a2cf44e68d305287cab784d0b52b02b551ab40d0308f1827242c7391a95e7ea7b69bee79accbdb7e04269bf2898433634a9bc905f3e7c0d75dee7260bf833a64b351c1b8b0b736155a0784b142fd49d2080b5632b264e91d3ab54a784f3be9522063506ec68e0f0f083478ec39a0a54c5ba24e41fc3b722a119310b41a0d40e7e065778037837348e7593772fffe015074774d0fc2d519a235442f05b5240bc0d3b03118072310f4014aa407853ce22516c2a5cd21743ae50bd899de264225744e9e945df906e7f9b784ac2b7b7c514a3a5ee3a072d089733e54a13143a9e3ae936b120160f8f238559c2db13947dbfa8bb54905d08e67837d57e10186ba5de5b23f759cbe8e679ed523721500bd57e2bc45e58fbae519dfabf2a8e54d8a820c85c49f7bcb857924b9785db6860f436dd125fd220f16072723e5abc1208b4ddc7ff02ceccb80c52631cdac6fb125181a0571fe1873fa53c03944cc761b84688f5ef5a6a4474a59f351657541ad2d7697bb01b40c8f589494319e5b266ee0ed2eebdb6df6eadeb20b299d606c8fb0079df30e85991068edbdb84278eebaab5f47171aa603eabfacf2bc32b8c0eb25d9a917b8bd885a9e447f9a2018ff0ef3b53ec2673e0d048ffe8f7568a8286acf6330233f35119d9709d182e0d8820121d447ead9dc358c0b10d86f3455f839b92c693c74830d05ba17659e6b20a1ffd1ebbad68ceb23a76b44fe7e0fe151fa1d47d3cb02356c96368dfa167d701fd74fc64ed49815ba69934ff3d1b4c530d637d4fa53ea98cf30cd7c7d889492bf5c7fe4658a2ec0dd8efe5e7d7d91f7afc240be39721a72e6a9697440bd94991fe0244fbbea49578c48c5811d78be1582a21d39b93a9ec6d73460717d20c4f71ea02bd52c32a97b60d76ad699bbcc90e4aba24438c9b4e161deaab510f99cfd1fefc915bbefb4c73650467d47c43cf4bbeb037e67526d4c5868d4dce6a807ab08fcd477f90d6827831769ad4db4120d51a0b43f11e011a93a4976b91022851cc336aab643969bc06c9410e0f12bb952d880037248bf37e89f0ba6ad451c9e3a0b1d4479001a6e8d8b3115ae19af4372a5dee1f7017d7c5a0d97e15150d617ed08941f91967160602e727d30447fc2a9ec9c289900adb739888af3068d4772e608d9b9e6676666ebf9c82305d11ab546cb0638796f1ad334906bf582dbd45e937e6a20267079e7b73075110849642fa99adc37070c00d0d8127262a42d0f21a3620c242abe7eda1a925dad842bf67e7b7e2de399a65230cc8a77df91fa7f668eb16ff87ec428f6a0ace1a4d0e6dda60baf4508e41a2ceecd3a30a307b78c90b30f3f5393dc5df91294a2c1c72e4c1d495836726c32fbc175b6dbabfedfec0f387c328de22aed4e089318fc82e3ad83f1ab743e48aa521b34d0d581ce9933a3a70c83df4a8963653bd25eb7996a78d45e2530f6ee91b8d7f7e7297695493ac8428198941fba69bb8a5e9c9571c7b87f4058d7f74fb5d5a671fdc67b4eb2255744aa0d707083d989edc5939acb76c29d6b1fc1052322dbe974f1b3df88a43d3a57469df2f250fc05f6dbfcb0f301ebb6b08d9bb1f3f173af544d67020b1ec7d44f80e9a286dba5158b42a5c15576e2d5527999e01f7ea916aa4b5fd92b0dc0883dd8fe114823d5120d5a89d65c0f8c771650f22e32f0de9adc4a1655e48e7b77c5ecd495c3ce63847b1500b2c18075a213552d780dcd7b23d046f4143fe8f3433be9840b9f9fdc76224d20b245b9ac7df3e31e76c5acdfceafe63dce0c7b7faba2e17589f9385f1a51851752c992d5285f921001479df7afbea3a73b9e417124dd5bfaa8f0fcf9e05b0e51d7c3495b471ae235d8a500cb13f6d3d556a5934dd44276038e3be5509513060ea76d796c7730c5ae80b92fbbc228f96c41e0e814fca889643b053d916874a50762f837e7b0e0352895f470cd56128ebd4e01ca19d9bf45ac2c476452d3dec6ca98478ae171c0eca983a33393de9d1536ab4f9de9c8de2b337f4885e4950f726e64aa46c206544410778163f70aa279500cb1316e20f58171189eacd895cb515b1e9f49bd2411a224dba1c49e3c96ed77a5dfd0a118041f7957378ba895b52ef4783f35666ec268cc1eb2f1cfa801992cb2adc4203a2e63dc9c3aeda3807a918a0eb4ea218b5ae8ea59a326272d5582291e0a562388379ee6a3dea497094461646e6aea5eba7c13cd67daebbd6f9637ba4fb6af5993c34c6f1803924ed4a60fcf573a53173f80b6b44c398e008566e887dc40a01d1484b3a4f8091c95f79587b005ab59b97322d98053ccbe1588509d1c9cab32002a3179c9484f5e2b57b4af232e16b9495932973dfce11d0bc3d1a542194a6ce2251cce5d1a077dbd81a431b00222123b55e8a03156a2246e5987c352f608e881194df13702c87d69ede59f2a440d9de81ead9032640a125b2ce33354673c671d0da5fb44aab646da297f3bafcd1bc1a6f4929e0098d5e0a253e114072086ffbea446c07a15428803dd038a7089c1393c368a20910f8d19887fca90e76f9c2f61e7772e7eae2707aaa2425534ea9f7ff836dd6516f37159c868503875a3575e2e9aa4011e6c06b762dfbcb6eaff08622c4d77e2c335c4e260febae4dddbd3b9feba21f540ae8599a9520b7d3b516f15c97ca794b5ec9601cc539a3cc34f471d7d9ace1d81704fc69e7096a175dfe6067a1a0c67516f481b71212a8a06c9c2638e8cd0362679e132b31fc9df4caf93b7e412ebca4e164ac340e67a107291ea360fe3de4cdb3793338de3ff8e254a2ef098614f75862b7396d37b7ba3ee2b0e2676a8635abd7ac95ce53af2adcb9bf21dd8defa4e7fe8de4924783fb5e7fe6b058a8420c51e481dba76b2c54f79b166480612e95737fb783992a657539621ba305931b7fc3930bb65af53d125af87b85a5473899b091f73c6434190bafb14bb4097fd5657bc4e7e19ef7e9644b1b5d9becdf0037020d15ed6606379e86997c4289d5bb0547ffe226762db9045f391c5f44558a20b4ee3d5acc6fed5349c45a7929e011a8d3893912d0b10b5feab2d39a5d8faad9c845c5c0d3535a850f12b8f3f9a3d667c80540197ef1830fae2401dd9a30f4285825f07e2b8190851bc8c50b0cb68c690c35833dfbad56d2b161eeaa7aa31bc5ea0a7f6a9bcdd811b2ad17d2e1acadb19bdd6899eed882b9fd104e5587fa83fa0579f98d51fb7df35c71608d443f4ad576986669bcac9a9f0b80911a65a7224511cc16d8c13fd751846829ae8625403205a0078e12677468297a4bea34e07c2ea60434217919287268cebeed667f96fce46c0664df0c37c408817d661352a9c56ef922e216cd1929d6437b5976214b07d85625961b463ede9712bd0005f287b42630c17aae72d6c77b58fc127dbbd8720ba76eb804f09540a1f3bc4a0c97c663180a9ed59955b482aa2028b68407cfbcc098a13beecf1ec9250f98ebc8c121f29b145376295aafc0dd5b5fa1b93c404823307f8b135c39743a22ba2192c72fd7c7c5959ff335411317a5d3b6741794e3ecfef6d9519527ff6fa10d8f74927322c8806f1fac018133169936874e450de651a38d14bf4e9962ce55aceece72ebffc6db34aa68244d91c82a240208a39bfff89b0f5fa70128b9b637572324ab2c98a4bcd964c5da21a34ada6ca354bb26280652aa02852844053c27f09c6b56248eeb624098bc63079643ff31c60e655f0ba9f0d4ca5d332200c4fcb80bba94c6be879fe9ceb080bb7840b2c5b2a321724b5721f71c7feb9531bfe6ee9169a655891402d3c2fc1dfc34f1edb7c5c9d1fd3227fffc3ddd72ba0fae07bc0585843ed1b9d6761732266da552914222b173d669f28d4ad993e25efef9f9baa3f7436d0536609b4beaf0bf8338949bd411a470035100d86650fe953bc5fb3031462ef15d39a2cfca2cac2a370228a507235afa4b280899de012f112f571866c0b8327d561c5211b8965fd3a52b9350a9955aebf8255a193047bf06ff03b6d49ea5147985fa77f59b1d8f12db66de0a38dfc25cb8760d56b84d58841ec3893ff4add8a53b91ffdffc0df32b90769ca544dbb62b9b2751dc0d4547021316e509a76d30aa70c7c0c9a60a3494b678fe9b4e30fac6cc5e8f2dfc3634e8e4e28cacfaa32f50284f8b537035985e0df07ec44511009339f51a67b2df23e1f4c66f53cb1863a75c3b5ae202faf6ac805319512236c09c1737ef7c915d710504c80fa158253937fcaab3f7e95c6aa9ca57f61c386fcfc578ac9528903c70315176e4eea87bd817980defe661bc05813f5bfeb1b43915dbc1f5eaeeae994b654f36ab046dd8555d956f7b7ec328a0fffe8aa6ba200d088aa0969bed2504dfd40dc7e5c4f370c522a3bdcafa0c7598d21ea4d77d58b64a085674e1515730458e728c745d8edb52e51538d51cf2c9ce8baab7fa008e39abbf06df2f149f4a9765e9f6138b73b7c7b5f2765bfc342192e8ca3d3ae7024af920a30bd71070a732ee5aedc021bfe95d936b8927f3e3d657e823cf5f2ff1b5c947567ae99de89879ad9a25f11b3fab359f8e9c45b32415d6ba35e408256230676f514d10254f462d07717d0b150bb6fd8f13a711ae2d1218e945c78dc25489a7748f2ea1d067c4e19c69b1368785deb558d97b805814ae28b5234f2ebab88a691a4f980a1dc3e476052f4717f4474867e795a86bf220d506e0b7e088ddc5e1aebf4012aa5512a587aff9f8454ab1736a1db10121d7d825b4530ca263c9d6a7f0c883a486214b0b0ac4a809d508b377a7a7320934bb8df35a7c90ab317b80d9c59e0d2dd2b32e21eaedd2c31ecac8b0b701db68f0d7baef1e4c917d46cd10cea3bfdb4c8f9c33f33891ec7101d99c16b48f2b2b01623e0fba1e5528e808f17236160978efe0314c5a76abbcff43ddda6b04e9564ae59bebb41a1436cb35e6f5c6d0b6d07842f86b17e9c11aedaf9292ead8371216b63f73dad37060084956068dc9dda2c51dd4520afddbd274886573d9cfc41a7212060022ff9cd8858ba88671ef5de3e3333738902d8b9292f9c31c21b5459a7a0d18ba80f65848983a3b17d47f2f75150d5f91da0ba8c791e0f30f19ab69f41a83a18d5f5207e0147daa8138d2ba4629b204585715c9f1811c35bebf88c6639af7ed508c3a2096bb9931c943699d2ce7e344c958a9b33bbf9f43d6276afd88ac95dbdf21d978798d4ec7c13b5798674", 0x2000, &(0x7f0000005ec0)={&(0x7f0000004300)={0x50}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 839.921195][ T623] FAT-fs (loop5): invalid media value (0x00) [ 839.946550][ T623] FAT-fs (loop5): Can't find a valid FAT filesystem [ 840.162845][ T635] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 840.178817][ T635] __nla_validate_parse: 4 callbacks suppressed [ 840.178826][ T635] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016405b0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000", 0x29}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:59:15 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000580)={0x1f, @fixed}, 0x7) 09:59:15 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:15 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x29, 0x7, 0x0, 0x0) 09:59:15 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000500)) 09:59:15 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x29, 0x7, 0x0, 0x0) [ 840.476643][ T659] FAT-fs (loop5): invalid media value (0x00) [ 840.524170][ T667] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 840.533747][ T667] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 840.545265][ T659] FAT-fs (loop5): Can't find a valid FAT filesystem 09:59:15 executing program 3: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x990, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"]}, 0xa08) [ 840.576767][ T671] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 840.593855][ T671] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016406b0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pkey_mprotect(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000080)={0xa, 0x4}, 0xc) 09:59:15 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000280)={0x1}) 09:59:15 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000", 0x29}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:59:15 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)={0x40, r0, 0x427, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}]}]}, 0x40}}, 0x0) [ 840.795983][ T685] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 840.808674][ T684] FAT-fs (loop5): invalid media value (0x00) [ 840.822635][ T684] FAT-fs (loop5): Can't find a valid FAT filesystem [ 840.830732][ T685] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000140)=""/238) 09:59:15 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) [ 840.884315][ T692] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 840.908823][ T692] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:15 executing program 4: syz_io_uring_setup(0x6b53, &(0x7f0000000580), &(0x7f0000ffa000/0x3000)=nil, &(0x7f00005ea000/0x4000)=nil, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) nanosleep(&(0x7f0000000480)={0x77359400}, 0x0) 09:59:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016406e0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:16 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, 0x1}, 0x90) 09:59:16 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x4c, &(0x7f0000000040)=0xffffffcc, 0x4) 09:59:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000", 0x2c}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 841.207321][ T710] FAT-fs (loop5): invalid media value (0x00) [ 841.247551][ T724] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 841.256949][ T710] FAT-fs (loop5): Can't find a valid FAT filesystem [ 841.258725][ T724] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:16 executing program 3: futex(&(0x7f0000000000)=0x1, 0x8, 0x0, 0x0, 0x0, 0x0) 09:59:16 executing program 2: get_mempolicy(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000ffc000/0x1000)=nil, 0x2) 09:59:16 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x6, 0x6, 0x401}, 0x14}}, 0x0) 09:59:16 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$char_raw(0x0, 0x0, 0x0) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x15, &(0x7f00000000c0)) ptrace(0x10, r3) ptrace$setregs(0xf, r2, 0x0, &(0x7f0000000040)) [ 841.684203][ T744] FAT-fs (loop5): invalid media value (0x00) [ 841.747365][ T744] FAT-fs (loop5): Can't find a valid FAT filesystem 09:59:16 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@mpol={'mpol', 0x3d, {'interleave'}}, 0x30}], [], 0x3c}) 09:59:16 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:16 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000040)={0x0, 0x0, 0x0, 'queue1\x00'}) [ 842.081379][ T765] tmpfs: Bad value for 'mpol' [ 842.187258][ T767] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 842.200768][ T770] FAT-fs (loop5): invalid media value (0x00) [ 842.201415][ T767] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 842.235336][ T765] tmpfs: Bad value for 'mpol' 09:59:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010001640780002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000", 0x2c}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 842.266327][ T770] FAT-fs (loop5): Can't find a valid FAT filesystem 09:59:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f00000007c0)={0x250, r1, 0x1, 0x0, 0x0, {0x23}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xfffffffffffffdd8, 0x82, 'source_mac_is_multicast\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@pci={{0x0, 0x1, 'pci\x00'}, {0x0, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@pci={{0xfffffffffffffeb4, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}]}, 0x250}}, 0x0) 09:59:17 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xa, &(0x7f0000000080)=0xafc, 0x4) 09:59:17 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) [ 842.464594][ T799] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:59:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d8000000000000", 0x2c}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 842.516586][ T799] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:17 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6c, &(0x7f00000003c0)={r2, @in={{0x2, 0x0, @dev}}}, &(0x7f0000000280)=0x84) 09:59:17 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000002c0)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0xffff2df6}}], 0x18}}], 0x2, 0x0) [ 842.705259][ T808] FAT-fs (loop5): bogus number of FAT sectors [ 842.711370][ T808] FAT-fs (loop5): Can't find a valid FAT filesystem 09:59:17 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000580)=ANY=[@ANYBLOB="dd0400130000000000010005000000000000000200002000000401"], 0x28) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 09:59:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x2}) 09:59:17 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) [ 843.087870][ T832] FAT-fs (loop5): bogus number of FAT sectors [ 843.094530][ T832] FAT-fs (loop5): Can't find a valid FAT filesystem 09:59:18 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) [ 843.228851][ T839] FAT-fs (loop5): bogus number of FAT sectors [ 843.238003][ T839] FAT-fs (loop5): Can't find a valid FAT filesystem [ 843.370278][ T842] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 843.389953][ T842] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = fcntl$dupfd(r6, 0x0, r5) syz_kvm_setup_cpu$x86(r7, r4, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) 09:59:18 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010001640f00002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d800000000000000", 0x2d}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:59:18 executing program 4: socket$kcm(0x2, 0x200000000000001, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x141001) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) epoll_create1(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x1ff}, 0x0, 0x0) 09:59:18 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) ioctl$TCSETS(r0, 0x80047437, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "ef4990ae547249e167f41e74d15207c4e5dfc1"}) [ 843.768922][ T876] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:59:18 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) [ 843.860283][ T876] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d800000000000000", 0x2d}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:59:18 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) ioctl$TCSETS(r0, 0x80047437, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "ef4990ae547249e167f41e74d15207c4e5dfc1"}) 09:59:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)={0x3c, r1, 0x1, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 09:59:19 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) dup3(r0, r1, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:19 executing program 2: r0 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x8000000000000ff, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000000140)={0x0, 0x0, 0x0}) 09:59:19 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(0xffffffffffffffff, r0, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:19 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(r0, 0x0, r0) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x0) 09:59:19 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8c, &(0x7f0000000180)="c4c691019919da078a0098d1e0c393b040f762910000000000000022addee07bee0e6333b5cacd893169b618322ff6602022511253508b5a4496728c2b46e1bc340e2997b9a3406ea73b690808ffdb2dc4a7410b23e405cc30094b1adacdcfac320001000044e203c4b1bc83d8e68fcb229b4b0764a6cf39566fe5a2fad72b0cd3e8bd3e1a0cad036b7f1f9c"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 09:59:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010001640710102000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1003}, 0x800, 0x0, 0x1, 0x0, 0x8001, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000006c0)=""/243, 0xf3}, 0x60030001) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x1, 0xff, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f00000005c0)=""/235, 0xeb}], 0x3}, 0x12000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x2000007}, 0x8) r5 = gettid() sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)="d5264c23b82a4ff0b0b746eda4ddf9a17ecf861dbab1dbc100bf25ae63c6b545a671f709d19d76e3fec6bac4a06d1474ade79b89724e56d5ce79b34f881a87afeb4de3ad3a02b7e9f75e7359433d823068bec3446b4678430211e0f516da7dc4468f49e2904b12dd5fef172e67bbc76ab5f14bd0627625fa62faa5740ba69f2a5a0cdce2c45e4abc127b50b299835950d7f615ca1dcfad3a03cf68e2", 0x9c}, {&(0x7f0000000900)="5624311ddf422dcc2316c66ea003be0b45030a8241fa64b4c770694120349acd035628cb3c042fd5a927a89638bb5bdd958679f6dae0424e4bd2660006e7c6a83765dac7ec818187ddd40ccc3b565cacacd1a9090d1fd752f82d3d87edde6a97ca85d381b9514ab8b3d8ae4177", 0x6d}, {&(0x7f0000000340)="c7", 0x1}, {&(0x7f0000000980)="c8df0ffd1db785029bd4e3ce49285de2ca481d352f0595fd4ae0649f21093038380f5441a09b9d01954f23e60f0131b4943f41c5419af118913eaa7b1fc11f2257d01badb2c444aff84e11527b9a904ec2546c72ad31a320bf487477f3c5cf4ae64444414e104ecbba4ddd48279003e80404ec1d291ca0", 0x77}], 0x4, 0x0, 0x12}, 0x800) perf_event_open(0x0, r5, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001f80)={0x2, 0x70, 0xff, 0x3f, 0x7, 0x4, 0x0, 0x2000, 0xf28c27eb1bb71846, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000001f40), 0x1}, 0x48000, 0x5, 0xffff, 0x7, 0x400, 0x9, 0xffff}, r5, 0xd, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x9, 0x0, 0x1f, 0x80, 0x0, 0x1000000000080, 0x50ee8, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000b00), 0x4}, 0x204, 0xfb, 0x7, 0x1, 0xffffffff, 0xe3, 0x9}, 0x0, 0x100000, r4, 0x8) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000001a008104e00f80ecdb4cb8fc02000004a1dc0200810040fb12000200ac14141b40d800000000000000", 0x2d}], 0x1, 0x0, 0x0, 0x10}, 0x0) 09:59:20 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(0xffffffffffffffff, r0, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:20 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x43) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f00000001c0)=@sha1={0x1, "4f5dc4ae195ab53a23daf8031c00000000000020"}, 0x15, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 09:59:20 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='\x00\x00\x01\x10=\x8f\xa2\xc7\x8b\x96|?\x16\xbf\xa1$\xe2\xf4\xa6t#M\xe0l\x0e<\x89\x8df\xa0m\x81\x00\xbb\xff\xc2V\xff\xb0j\x06\x00\xba\x1a\xe7@\xab\xe2v\x8a\x97\x00\xd3\xa5\xecPb\x10\x89\xc2\x97L\x1e\x196\xafCM>\xba\xc6\xe5\xa6\xac\xfa\xed\xdf;W\x06F\x89\x8e\xf1\xf8*_,\xc3cL\xbd\x83\x83\xf3\x14\xedxl\t\xb4bi\x9fI\xe6\x8b0\xceL\xf3V\xf5Vs\xa0\x1bd\xe8\xf7\x88\xa1\xa9\b\xd8P\xb5\x03y`d\xc8|xd\xb7\x8b\x1f\xce\xa0\a\x8c\xb0\xf7p\xe42') mlock2(&(0x7f0000a93000/0x3000)=nil, 0x3000, 0x0) mlock2(&(0x7f0000a97000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000a94000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000a9c000/0x4000)=nil) 09:59:20 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000019440)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffdf}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x10e, &(0x7f0000000180)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 09:59:20 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(0xffffffffffffffff, r0, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:20 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), 0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000640)={r1, 0x370, "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"}, &(0x7f0000000080)=0x378) [ 845.295383][ T28] audit: type=1804 audit(1599386360.156:46): pid=963 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir355577601/syzkaller.kt0WXf/942/bus" dev="sda1" ino=16337 res=1 errno=0 [ 845.297786][ T963] Module has invalid ELF header [ 845.412914][ T975] nla_validate_range_unsigned: 1 callbacks suppressed [ 845.412940][ T975] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:59:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r4, &(0x7f0000000000), 0x40000000000024a, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r5, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r5, @ANYBLOB="08000400ffffffff08000200", @ANYRES32], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="200000001400210100000000000000000201"], 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x8, 0x1, @remote}]}, 0x20}}, 0x0) 09:59:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x20, r1, 0x703, 0x0, 0x0, {0xf}, [@ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5371745b9c470111}]}]}, 0x20}}, 0x0) [ 845.478174][ T28] audit: type=1804 audit(1599386360.336:47): pid=963 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir355577601/syzkaller.kt0WXf/942/bus" dev="sda1" ino=16337 res=1 errno=0 [ 845.554650][ T975] __nla_validate_parse: 1 callbacks suppressed [ 845.554661][ T975] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:20 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f00000002c0)={0x5, @output}) 09:59:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x50, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x50}}, 0x0) [ 845.686941][ T989] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 845.718557][ T990] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 845.839104][ T990] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010001640b50702000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:21 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x100a00, r1}) 09:59:21 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:21 executing program 3: r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x0) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)) 09:59:21 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0xfffffffffffffe30, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46044000", @ANYRES16, @ANYBLOB='\x00\x00\x00\x00\x00WP'], 0x4}}, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) [ 846.265848][ T988] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 846.308337][ T1015] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 846.323932][ T1016] IPVS: ftp: loaded support on port[0] = 21 09:59:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x6, 0x0}]}]}, 0x58}}, 0x0) [ 846.389791][ T1015] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 846.498883][ T1048] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:59:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 09:59:21 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x0, 0x0, 0x300, 0x17, 0x0, 0x8d}) [ 846.543117][ T1048] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:21 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) 09:59:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$can_bcm(0x1d, 0x2, 0x2) close_range(r0, 0xffffffffffffffff, 0x0) 09:59:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010001640c40702000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000180)="6426f30fc7fb2e660f6f96416bd9e0f4f23ef0f65316f2adbaf80c66b8bc3e6c8166efbafc0cb0faee74e0bad004b000ee0fc7a20000", 0x36}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:59:21 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x3) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x12, 0x3, 0x0, 0x0) 09:59:21 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000380)='./file1\x00', 0x0) [ 846.891741][ T1065] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 846.967968][ T1065] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:21 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f0000000600)="4ebefa1e923f1e018b6e53", 0xb, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180), 0x0, 0x3, r0}, 0x38) 09:59:21 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x20, 0x4, 0x3}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r1}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r1}, 0xc) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x10, 0x2, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/102400}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) [ 847.582078][ T1019] IPVS: ftp: loaded support on port[0] = 21 [ 847.744125][ T1090] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 847.772039][ T1090] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 847.875359][ T282] tipc: TX() has been purged, node left! 09:59:27 executing program 4: r0 = socket(0x10, 0x80002, 0x0) close(r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x24, r3, 0x1, 0x0, 0x0, {0xf}, [@BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x24}}, 0x0) 09:59:27 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(0x0, 0x0) 09:59:27 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000340)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x38, 0x3a, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "9d3999", 0x0, 0x2f, 0x0, @private0, @dev, [@routing]}}}}}}}, 0x0) 09:59:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x24, 0x4, 0x8, 0x201, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5}]}, 0x24}}, 0x0) 09:59:27 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, 0x0, 0x0, 0xffffffffffffffff) 09:59:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010001640c50702000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:27 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(0x0, 0x0) [ 852.471258][ T1159] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:59:27 executing program 2: capget(&(0x7f0000000000)={0x20080522, 0xffffffffffffffff}, &(0x7f0000000080)) 09:59:27 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-des3_ede-asm\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000040)="24c8181d000000000000ad2beba5005cf47d12e27903d3f8168b9f62f35cc5f4ec2ec34026d255d8e582a7ed404ddc67c5b890c2027b5ee7", 0x21efd786c55de43c, 0xffffffffffffffee, 0x0, 0xfffffffffffffff6) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xb71b829b6f5560a, 0x8dffffff, 0x0, 0xfffffffffffffff1) 09:59:27 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x6b6b6b}]) [ 852.580429][ T1159] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:27 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) [ 852.693232][ T1168] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 852.727944][ T1168] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000019440)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xc3, &(0x7f00000005c0)="f7f249b9740c0764ca04f400befbf2f3c921bf3c0f339e57f4f21016a5b60a00088024c30e478947d190ac0000009038396bb68e4053cd0c42727a81b1af4915e96c43607a144f6543b6faf143e648fcbde4967033f51be252a22ea40c9422247185569bdffc58cff1685babdf5c77ac6c0ceb6e4d48ec30cd70a1a381611750c555848886f1e31994b058b3289760d441a0b9777c243bccd3ff8bfc59a323235d9e3bc4442f31a171b45bcfe35bc10298e76c298ef72b6e54366e2e553731707f8cb0"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:59:27 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) dup3(r0, r1, 0x0) umount2(0x0, 0x0) 09:59:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x7, 0x1, 0x101, 0x0, 0x0, {0x0, 0x0, 0x5}}, 0x14}}, 0x0) socket(0x10, 0x80002, 0xc) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0xce21, 0x0, @mcast1, 0x916d}, {0xa, 0x4e23, 0x0, @empty, 0x7}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000000]}, 0x5c) 09:59:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010001640872302000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f00000000c0), 0x4) sendmsg$AUDIT_SET(r2, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x38, 0x3e9, 0x100, 0x70bd2c, 0x25dfdbfd, {0x12, 0x1, 0x0, 0x0, 0xa1cb, 0xfffffe45, 0x2, 0x1, 0x0, 0x1}, ["", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x8840}, 0x240000c5) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000300)=0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000340)=0x5) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$CAPI_GET_FLAGS(0xffffffffffffffff, 0x80044323, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x201100, 0x0, &(0x7f0000000000), 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x2, 0x3, 0x208, 0x6, 0x0, 0x0, 0x0, 0x0, 0x170, 0x170, 0x170, 0x170, 0x170, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98, 0x0, {0x6020000}}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x170}}, {{@uncond, 0x0, 0xb0, 0xd8, 0x0, {}, [@common=@set={{0x40, 'set\x00'}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x268) 09:59:28 executing program 4: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f00000003c0)='X', 0x1, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000005c0)="0658", 0x2, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r3, r2, r3}, 0x0, 0x0, 0x0) 09:59:28 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x1d, 0x0, &(0x7f00000000c0)) 09:59:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendfile(r2, r0, 0x0, 0x7fffffff) sendfile(r2, r0, 0x0, 0x4000000) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda, 0x14c}, 0x3f00) [ 853.313499][ T1206] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 853.335427][ T1207] Cannot find set identified by id 0 to match 09:59:28 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dri/renderD128\x00', 0x101800, 0x0) read$FUSE(r0, 0x0, 0x0) [ 853.387155][ T1206] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:28 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc058534b, &(0x7f0000000040)={{}, 'port1\x00'}) 09:59:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x33fe0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) [ 853.474541][ T1224] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:59:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) clone3(&(0x7f00000003c0)={0x310020d80, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) [ 853.553086][ T1224] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:28 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x2, @in6=@private0, 0x0, 0x1, 0x0, 0xfc}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0, 0x0, 0x0, 0x0, 0x7}}], 0x400000000000107, 0x0) 09:59:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010001640882302000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:28 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000200)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000240)={0x7f, 0x1, 0x1}) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x0, 0x1, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "484ba531"}, 0x0, 0x0, @fd}) 09:59:28 executing program 4: socket$kcm(0x2, 0x3, 0x2) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)='syz0\x00', 0x200002, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0, 0xfffffffffffffeb2}, 0x35e4ed281d171825) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000200)='ns/mnt\x00') ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xd4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f00000007c0)={'geneve1\x00', @link_local}) 09:59:28 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000080)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000440)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}]}) [ 853.956499][ T1243] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 854.005031][ T1243] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 854.187140][ T1248] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 854.252421][ T1248] overlayfs: upper fs does not support xattr, falling back to index=off and metacopy=off. 09:59:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x194}], 0x1}, 0x0) sendmmsg$alg(r3, &(0x7f0000002100)=[{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000080)="2edf5b520fcd935a1e3fba0ad02b674e5e", 0x11}], 0x1}], 0x1, 0x0) sendmsg$kcm(r3, &(0x7f00000023c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="51280d4b2186725b79dc05e114f4a202159b3dee43309b59b727fdcc32e05655698ffa89d6891173d1add988f4d1d95b941c15ae9029dfba94d33f3aa15fe7f56c299f3461ca2355dff6e24caec34133266d14ce64bf8973053b1fd007af11db4cddb768517c3af7624532f3358f1dfcf36aa6b09fdf4e3cfc397bcfbee7eaa2360dbe", 0x83}, {&(0x7f0000000280)="31f5c5fbfc4824c98b8455b5a7c4a6a27010b16a37eccef172646c2685bb2b1778ba9d4abd71b1971799563c84c443533ce909a9f7b003607ba335ddb5144727294971a9c51315b69f7191b6cd1ebace63b18f45dd9efdd1b4ffe45ddecf73f19367a576e13254e2a682019ac73d730a80", 0x71}, {&(0x7f0000000300)="3a22b888fcba7be3b5591f9ec13ecffc585a2a88b4571e6ac8e85c96bf00a5349df20c29d420c3960a09aaecb673eaa63ec0337db4fec9e2e37a081e5257c76b17f129ddfcf3b58dfc9d90d7192c939be3738566b57cfcf09c60eb907267c36a41a357760adb2460b59a099cba32e3f295c81c413cb4199dcf7067823d54d936523b805b173dfe90cd37676c7ef557", 0x8f}], 0x3}, 0x0) [ 854.342508][ T1248] overlayfs: maximum fs stacking depth exceeded 09:59:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) ioctl$TCSETSW(r0, 0x541b, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, "4cafbc930d23ee69a6209badfb5de1bc884184"}) 09:59:29 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local}, 0xc) 09:59:29 executing program 2: openat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f0000000040)=0xa, 0x1959cc36) 09:59:29 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f00000000c0)={0x6, 'batadv_slave_1\x00'}) [ 854.864290][ T1263] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 854.883923][ T1263] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:29 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x74, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x74, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:59:29 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0x402c5342, &(0x7f0000000000)) 09:59:30 executing program 2: r0 = socket$caif_stream(0x25, 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000002900), 0x4f, 0x20024015) 09:59:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010001640892302000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:30 executing program 5: rseq(&(0x7f0000000000), 0x20, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2001, 0x3, 0x220, 0x138, 0x150, 0x150, 0x138, 0x150, 0x1e8, 0x1e8, 0x1e8, 0x1e8, 0x1e8, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ip={@multicast2, @dev, 0x0, 0x0, 'batadv_slave_1\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x280) 09:59:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)={0x24, r3, 0xf, 0x0, 0x0, {0xf}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}]}, 0x24}}, 0x0) 09:59:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000080)={0x2, 0x0, [0x140, 0x1]}) 09:59:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000380)='ethtool\x00') perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x70, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000001cc0)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000003880)={0x0, 0x0, &(0x7f0000003840)={&(0x7f00000037c0)={0x14, r1, 0x76b29fe781cfc301}, 0x14}}, 0x0) 09:59:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={{0x14}, [@NFT_MSG_DELOBJ={0x34, 0x14, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_OBJ_TYPE={0x8}, @NFTA_OBJ_HANDLE={0xc}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x5c}}, 0x0) [ 855.519992][ T1314] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:59:30 executing program 5: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) exit(0x0) mlockall(0x2) 09:59:30 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x2, 0x0, 0x0) [ 855.582829][ T1314] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:30 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f00000005c0)={@remote, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) mbind(&(0x7f00002e5000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000140)=0x5, 0x40, 0x6) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000000)) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) fchdir(0xffffffffffffffff) bind(0xffffffffffffffff, 0x0, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) 09:59:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r2, 0x0, 0x8000000000004) sendfile(r1, r0, 0x0, 0x8000000000004) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000280)) [ 855.669541][ T1326] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 855.699064][ T1326] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc6010001640fe2702000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:30 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000380)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x541b, 0xffffffffffffffff) 09:59:30 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0xaf02, 0x0) [ 855.983519][ T1342] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:59:30 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x2, 0x2812, r0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r1, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000040)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x10000000) [ 856.042993][ T1342] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0xc01, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @lowpan={{0xb, 0x1, 'lowpan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r5}]}, 0x3c}}, 0x0) 09:59:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)=0x10021) ioctl$SNDCTL_DSP_SETFRAGMENT(r1, 0xc004500a, &(0x7f0000000100)) sendfile(r1, r0, 0x0, 0x1c01) 09:59:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, &(0x7f0000000000)=0xffffffffffffff23) 09:59:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff1}]}) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) 09:59:31 executing program 5: unshare(0x20000400) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) 09:59:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f00000000c0)={{0x1b, 0x5b, 0x39, 0x3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 09:59:31 executing program 3: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000ac0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000b40)='./file0\x00', 0x2) [ 856.801608][ T1357] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 856.889056][ T1373] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:59:31 executing program 2: openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) time(0x0) 09:59:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016400a2802000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write(0xffffffffffffffff, &(0x7f0000000000)="240000001e006700141e9b070009040080", 0x11) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f00000000c0)={0x200007ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000000)="1c0000001a", 0x5) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 09:59:32 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x18, 0x1411, 0x103, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x4}]}, 0x18}}, 0x0) 09:59:32 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') getdents(r2, 0x0, 0x0) 09:59:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae60, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae89, &(0x7f0000000180)={0x1, 0x0, [{0x4b564d02}]}) 09:59:32 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x4}}}]}, 0x34}}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) [ 857.344772][ T1444] netlink: 'syz-executor.3': attribute type 75 has an invalid length. 09:59:32 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @local, 0x5}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000840)=@assoc_value={r3}, 0x8) 09:59:32 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x0) 09:59:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r2) r3 = getegid() setresgid(0x0, 0x0, r3) newfstatat(0xffffffffffffff9c, &(0x7f0000008f80)='./file0\x00', 0x0, 0x0) [ 857.481337][ T1458] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:59:32 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0xaf01, 0x0) 09:59:32 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x4, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 'syz0\x00', 0x0}) 09:59:32 executing program 2: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x12, 0x0, &(0x7f00000001c0)) [ 858.311202][ T1503] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 858.331022][ T1503] __nla_validate_parse: 3 callbacks suppressed [ 858.331032][ T1503] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016406d3302000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) dup2(r0, r0) 09:59:33 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x4, 0x0, &(0x7f0000000000)=0x6) 09:59:33 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind(r3, &(0x7f0000000040)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f00000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100000000000000497400000000c65400"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="0703000006000000000000000000000004000000001000000800"], 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0xc415, 0x0) 09:59:33 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, 0x0, 0x0) 09:59:33 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) 09:59:33 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bce84c2e238b5eae719fd6321452d791cc0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be07d787ff889443ab36a0467879316bfc6d21915e61ca9791d9da035fcb", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 09:59:33 executing program 2: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000480)="ba", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, 0x0) 09:59:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = inotify_init() dup2(r2, r3) 09:59:33 executing program 5: r0 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) [ 858.815924][ T1528] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 858.856975][ T1528] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000a1047fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup(r2) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r5) utimensat(r3, 0x0, 0x0, 0x0) [ 858.926940][ T1542] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 858.964513][ T1542] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000280)={{0x0, 0x0, 0x80, {0x0, 0x0, 0x4}}, "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", "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"}) 09:59:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016400a0202000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:34 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_MCAST_TO_UCAST={0x5}]}}}]}, 0x44}}, 0x0) 09:59:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c000000100a01"], 0x4c}}, 0x0) [ 859.312697][ T1572] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.2'. [ 859.351170][ T1573] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 859.384151][ T1573] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x10, 0x4, 0x8, 0x8}, 0x40) bpf$MAP_CREATE(0x4, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x2000000a, 0x0}, 0x2c) 09:59:34 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) sched_setattr(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000440)) write(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e37, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) clone(0x50000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) 09:59:34 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000003600190100000000000000000300000004000000180001"], 0x30}}, 0x0) [ 859.685212][ T1584] openvswitch: netlink: Message has 20 unknown bytes. [ 860.063719][ T1586] IPVS: ftp: loaded support on port[0] = 21 [ 860.234762][ T1584] openvswitch: netlink: Message has 20 unknown bytes. [ 860.390068][ T1590] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 860.504399][ T1590] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 860.688554][ T1587] IPVS: ftp: loaded support on port[0] = 21 [ 861.231728][ T282] tipc: TX() has been purged, node left! [ 861.244070][ T282] tipc: TX() has been purged, node left! 09:59:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="00f0000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x37}]}, 0x28}}, 0x0) 09:59:36 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = dup3(r1, r0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x21, 0x0, &(0x7f0000000400)) 09:59:36 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r2, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1b, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3}, 0x70) 09:59:36 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x4e22}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003fffffffffffffffffff5ffe7ee00000000000000000100000000", 0x58}], 0x1) 09:59:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016400a0302000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:36 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x4a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[], 0xda00) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) [ 861.945242][ T1668] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:59:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) [ 861.989461][ T1668] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 862.028360][ T1674] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 09:59:37 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x1000ffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x330, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1f0, &(0x7f0000000000)=[{}]}, 0x10) 09:59:37 executing program 2: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x1000003, 0x4031, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x3}) 09:59:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000000)="b8010000000f01d90f01b370d60000c4e25d452f0f09b805000000b9e71200000f01c1260f01b969000000b9800000c00f3235000800000f300f078fe9f812c70f01c5", 0x43}], 0x1, 0x0, 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 09:59:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1400) 09:59:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x2, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='vegas\x00', 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0x4000}, 0x1c) 09:59:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000140)=0x1ff, 0x4) r2 = dup(r0) write$midi(r2, &(0x7f0000000000)="fc", 0x1) 09:59:37 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff7ffb}]}) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 862.797828][ T1731] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 862.839733][ T1731] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:37 executing program 3: r0 = memfd_create(&(0x7f0000000900)='#\'%nodev\x00\x7f\xe5\xd0ql\x86\xcd\xe6\x14\x93\xb0\x7f_,y<', 0x0) write(r0, &(0x7f0000000000)='/', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0) 09:59:38 executing program 0: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/189, 0xbd}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffa2}}], 0x400000000000953, 0x42, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14) connect$rxrpc(r1, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x40000000000037b, 0x0) 09:59:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016400a0402000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:38 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) setsockopt$inet_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000240)=@gcm_256={{}, "7961d39e0ac4878d", "287bd1b3313bd7eac352933891f45e9af224164a94b7dd63e91796d27104b098", "2dacaedc", "4ae11346890461ab"}, 0x3) 09:59:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, &(0x7f0000000040)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f0000000080)) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="640000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000440012800b000100697036746e6c00003400028014000200fe8000000000000000000000000000bb14000300fe80000000000000000000000000000008000100", @ANYBLOB="f2914187d273538f27bbee35e9a6d66bf1143d31af9773c398eac80ec86e9e0be4907ba5375658df9ff9db93c4557889d359cb345307e4a5ab115f75aed906242461"], 0x64}}, 0x0) 09:59:38 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2, 0x4, 0x3, 0x21f}, 0x40) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x4}, 0x38) 09:59:38 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x78, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:59:38 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x8000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bce84c2e238b5eae719fd6321452d791cc0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be", 0x44}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x21) [ 863.486970][ T1777] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 863.587485][ T1777] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:38 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = getpid() ptrace(0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 09:59:38 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r1, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000)=0x4187, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)={'syz1'}, 0x4) write$binfmt_misc(r1, &(0x7f0000000340)=ANY=[], 0x18) close_range(r0, 0xffffffffffffffff, 0x0) 09:59:38 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000040)=@newqdisc={0x40, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pfifo_head_drop={{0x14, 0x1, 'pfifo_head_drop\x00'}, {0x8}}]}, 0x40}}, 0x0) 09:59:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'team_slave_1\x00', &(0x7f0000000200)=@ethtool_stats}) 09:59:38 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) 09:59:39 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x3000009, 0x10032, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x7d, &(0x7f00000000c0)={0x0, 0x2}, 0x8) r5 = dup2(r4, r3) dup3(r5, r2, 0x0) [ 864.330632][ T1814] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 864.372199][ T1814] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016400a0502000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:39 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x6, 0x0, 0x0) 09:59:39 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) dup3(r0, r1, 0x0) 09:59:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$pppl2tp(0x18, 0x1, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000080)=[{r2}, {r3}], 0x2, 0x0) 09:59:39 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040), 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305839, &(0x7f0000000040)) write$cgroup_int(r0, &(0x7f0000000200), 0x400c00) write$cgroup_int(r0, &(0x7f0000000100), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) [ 864.954327][ T1845] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 864.991601][ T1845] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 865.694420][ T1860] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 865.742354][ T1860] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:41 executing program 4: syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000040)="040000090000ff01e66174000404090a020005740af820", 0x17}, {0x0, 0x0, 0x200000000ffff}], 0x0, &(0x7f0000000240)) 09:59:41 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f00000000c0)={0x0, 0x0, 0x0}) 09:59:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x24, 0x3, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_L3PROTO={0x6}]}, 0x24}}, 0x0) 09:59:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="00000000001f0c20540012801100010062725aad329d0000000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 09:59:41 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup(r0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x83, &(0x7f0000000180)={r3}, &(0x7f0000000080)=0x8) 09:59:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016400a0602000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 866.811339][ T1879] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 866.826420][ T1880] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 866.890392][ T1880] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:41 executing program 3: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x520, 0x0, 0xffffff80, 0x178, 0x0, 0x178, 0x450, 0x258, 0x258, 0x450, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2={0xff, 0x2, [0x5c, 0x0, 0x7a, 0x0, 0xa4, 0x0, 0x0, 0x74]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x300, 0x330, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @bytecode={0x0, 0x1a, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x6}]}}, @common=@hl={{0x28, 'hl\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"ab83"}}, @common=@unspec=@pkttype={{0x28, 'pkttype\x00'}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x580) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) 09:59:41 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mknod$loop(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f000002f000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r4, 0x1}, 0x14}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') rmdir(&(0x7f00000002c0)='./bus\x00') open$dir(&(0x7f0000000300)='./file0/file0\x00', 0x141183, 0x0) [ 866.943068][ T1889] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 09:59:41 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x30, &(0x7f0000000140)=@filter={'filter\x00', 0xe, 0x4, 0x340, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0xffffffff, 0x430, 0x430, 0x430, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, [], [], 'dummy0\x00', 'team_slave_1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}, {{@ipv6={@mcast1, @local, [], [], 'ip6tnl0\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a0) 09:59:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) copy_file_range(r2, &(0x7f0000000000), r3, 0x0, 0x0, 0x0) 09:59:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='statm\x00') read$char_raw(r0, 0x0, 0x0) 09:59:42 executing program 4: r0 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r0, 0x2008002) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) [ 867.239893][ T1898] Cannot find add_set index 0 as target 09:59:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000004000000020000000000000c03000000000000000000000500000000000000000200000d020000000200000002000000000000000000000000005f"], 0x0, 0x50}, 0x20) 09:59:42 executing program 0: mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0xe) [ 867.489614][ T28] audit: type=1800 audit(1599386382.347:48): pid=1916 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16382 res=0 errno=0 [ 867.529362][ T1914] [ 867.531790][ T1914] ====================================================== [ 867.538798][ T1914] WARNING: possible circular locking dependency detected [ 867.545810][ T1914] 5.9.0-rc3-next-20200903-syzkaller #0 Not tainted [ 867.552308][ T1914] ------------------------------------------------------ [ 867.559320][ T1914] syz-executor.2/1914 is trying to acquire lock: [ 867.565632][ T1914] ffff888098076460 (sb_writers#4){.+.+}-{0:0}, at: mnt_want_write+0x3a/0xb0 [ 867.574342][ T1914] [ 867.574342][ T1914] but task is already holding lock: [ 867.581705][ T1914] ffff88809a6202c0 (&iint->mutex){+.+.}-{3:3}, at: process_measurement+0x363/0x1760 [ 867.591087][ T1914] [ 867.591087][ T1914] which lock already depends on the new lock. [ 867.591087][ T1914] [ 867.601485][ T1914] [ 867.601485][ T1914] the existing dependency chain (in reverse order) is: [ 867.610489][ T1914] [ 867.610489][ T1914] -> #1 (&iint->mutex){+.+.}-{3:3}: [ 867.617888][ T1914] __mutex_lock+0x134/0x10e0 [ 867.622999][ T1914] process_measurement+0x363/0x1760 [ 867.628714][ T1914] ima_file_check+0xb9/0x100 [ 867.633827][ T1914] path_openat+0x154d/0x2730 [ 867.638933][ T1914] do_filp_open+0x17e/0x3c0 [ 867.643955][ T1914] do_sys_openat2+0x16d/0x420 [ 867.649147][ T1914] __x64_sys_openat+0x13f/0x1f0 [ 867.654517][ T1914] do_syscall_64+0x2d/0x70 [ 867.659457][ T1914] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 867.665854][ T1914] [ 867.665854][ T1914] -> #0 (sb_writers#4){.+.+}-{0:0}: [ 867.673244][ T1914] __lock_acquire+0x29bb/0x5570 [ 867.678609][ T1914] lock_acquire+0x1f3/0xae0 [ 867.683626][ T1914] __sb_start_write+0x234/0x470 [ 867.688997][ T1914] mnt_want_write+0x3a/0xb0 [ 867.694017][ T1914] ovl_maybe_copy_up+0x11f/0x190 [ 867.699468][ T1914] ovl_open+0xba/0x270 [ 867.704072][ T1914] do_dentry_open+0x4b9/0x11b0 [ 867.709351][ T1914] dentry_open+0x132/0x1d0 [ 867.714291][ T1914] ima_calc_file_hash+0x32b/0x570 [ 867.719829][ T1914] ima_collect_measurement+0x4ca/0x570 [ 867.725805][ T1914] process_measurement+0xca6/0x1760 [ 867.731633][ T1914] ima_file_check+0xb9/0x100 [ 867.736741][ T1914] path_openat+0x154d/0x2730 [ 867.741851][ T1914] do_filp_open+0x17e/0x3c0 [ 867.746884][ T1914] do_sys_openat2+0x16d/0x420 [ 867.752081][ T1914] __x64_sys_open+0x119/0x1c0 [ 867.757282][ T1914] do_syscall_64+0x2d/0x70 [ 867.762220][ T1914] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 867.768633][ T1914] [ 867.768633][ T1914] other info that might help us debug this: [ 867.768633][ T1914] [ 867.778938][ T1914] Possible unsafe locking scenario: [ 867.778938][ T1914] [ 867.786376][ T1914] CPU0 CPU1 [ 867.791728][ T1914] ---- ---- [ 867.797101][ T1914] lock(&iint->mutex); [ 867.801251][ T1914] lock(sb_writers#4); [ 867.807925][ T1914] lock(&iint->mutex); [ 867.814591][ T1914] lock(sb_writers#4); [ 867.818749][ T1914] [ 867.818749][ T1914] *** DEADLOCK *** [ 867.818749][ T1914] [ 867.826886][ T1914] 1 lock held by syz-executor.2/1914: [ 867.832265][ T1914] #0: ffff88809a6202c0 (&iint->mutex){+.+.}-{3:3}, at: process_measurement+0x363/0x1760 [ 867.842089][ T1914] [ 867.842089][ T1914] stack backtrace: [ 867.847974][ T1914] CPU: 1 PID: 1914 Comm: syz-executor.2 Not tainted 5.9.0-rc3-next-20200903-syzkaller #0 [ 867.857758][ T1914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 867.867802][ T1914] Call Trace: [ 867.871089][ T1914] dump_stack+0x198/0x1fd [ 867.875422][ T1914] check_noncircular+0x324/0x3e0 [ 867.880356][ T1914] ? print_circular_bug+0x3a0/0x3a0 [ 867.885550][ T1914] ? lock_downgrade+0x830/0x830 [ 867.890401][ T1914] ? lock_repin_lock+0x460/0x460 [ 867.895337][ T1914] ? mark_lock+0xbc/0x1710 [ 867.899748][ T1914] __lock_acquire+0x29bb/0x5570 [ 867.904603][ T1914] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 867.910577][ T1914] ? tomoyo_path_number_perm+0x4d0/0x4d0 [ 867.916205][ T1914] lock_acquire+0x1f3/0xae0 [ 867.920703][ T1914] ? mnt_want_write+0x3a/0xb0 [ 867.925386][ T1914] ? lock_release+0x8f0/0x8f0 [ 867.930063][ T1914] ? lock_is_held_type+0xbb/0xf0 [ 867.935002][ T1914] __sb_start_write+0x234/0x470 [ 867.939843][ T1914] ? mnt_want_write+0x3a/0xb0 [ 867.944519][ T1914] mnt_want_write+0x3a/0xb0 [ 867.949021][ T1914] ovl_maybe_copy_up+0x11f/0x190 [ 867.953952][ T1914] ovl_open+0xba/0x270 [ 867.958013][ T1914] ? __mnt_want_write+0x1bc/0x2a0 [ 867.963032][ T1914] do_dentry_open+0x4b9/0x11b0 [ 867.967881][ T1914] ? ovl_fsync+0x310/0x310 [ 867.972315][ T1914] dentry_open+0x132/0x1d0 [ 867.976732][ T1914] ima_calc_file_hash+0x32b/0x570 [ 867.981752][ T1914] ima_collect_measurement+0x4ca/0x570 [ 867.987211][ T1914] ? ima_get_action+0xa0/0xa0 [ 867.991997][ T1914] ? ima_get_cache_status+0x1d0/0x1d0 [ 867.997371][ T1914] process_measurement+0xca6/0x1760 [ 868.002570][ T1914] ? mmap_violation_check+0x1e0/0x1e0 [ 868.007938][ T1914] ? ext4_file_open+0x1d0/0x6b0 [ 868.012789][ T1914] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 868.018764][ T1914] ? ext4_dio_write_end_io+0x100/0x100 [ 868.024217][ T1914] ? apparmor_ptrace_access_check+0x510/0x510 [ 868.030280][ T1914] ? lock_is_held_type+0xbb/0xf0 [ 868.035220][ T1914] ? find_held_lock+0x2d/0x110 [ 868.039980][ T1914] ? aa_get_task_label+0x25d/0x540 [ 868.045089][ T1914] ? lock_downgrade+0x830/0x830 [ 868.049938][ T1914] ? __alloc_file+0x29f/0x350 [ 868.054618][ T1914] ? aa_get_task_label+0x27f/0x540 [ 868.059727][ T1914] ? apparmor_task_getsecid+0xc2/0x110 [ 868.065184][ T1914] ima_file_check+0xb9/0x100 [ 868.069773][ T1914] ? process_measurement+0x1760/0x1760 [ 868.075231][ T1914] path_openat+0x154d/0x2730 [ 868.079826][ T1914] ? path_lookupat+0x830/0x830 [ 868.084587][ T1914] ? lock_is_held_type+0xbb/0xf0 [ 868.089531][ T1914] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 868.095516][ T1914] ? lock_is_held_type+0xbb/0xf0 [ 868.100455][ T1914] do_filp_open+0x17e/0x3c0 [ 868.104962][ T1914] ? may_open_dev+0xf0/0xf0 [ 868.109556][ T1914] ? do_raw_spin_lock+0x120/0x2b0 [ 868.114580][ T1914] ? rwlock_bug.part.0+0x90/0x90 [ 868.119535][ T1914] ? _raw_spin_unlock+0x24/0x40 [ 868.124388][ T1914] ? __alloc_fd+0x28d/0x600 [ 868.128903][ T1914] do_sys_openat2+0x16d/0x420 [ 868.133583][ T1914] ? __might_fault+0x190/0x1d0 [ 868.138354][ T1914] ? build_open_flags+0x650/0x650 [ 868.143377][ T1914] ? put_timespec64+0xcb/0x120 [ 868.148140][ T1914] ? ns_to_timespec64+0xc0/0xc0 [ 868.152993][ T1914] __x64_sys_open+0x119/0x1c0 [ 868.157669][ T1914] ? do_sys_open+0x140/0x140 [ 868.162265][ T1914] ? check_preemption_disabled+0x50/0x130 [ 868.167980][ T1914] ? syscall_enter_from_user_mode+0x20/0x290 [ 868.173955][ T1914] ? lockdep_hardirqs_on+0x53/0x100 [ 868.179172][ T1914] do_syscall_64+0x2d/0x70 [ 868.183589][ T1914] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 868.189557][ T1914] RIP: 0033:0x45d5b9 [ 868.193451][ T1914] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 868.213048][ T1914] RSP: 002b:00007f63263b5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 868.221461][ T1914] RAX: ffffffffffffffda RBX: 0000000000021c80 RCX: 000000000045d5b9 [ 868.229435][ T1914] RDX: 0000000000000000 RSI: 0000000000141183 RDI: 0000000020000300 09:59:43 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000001c0)={0x1, [0x0]}, 0x6) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="4400000010000100"/20, @ANYRES32=r3, @ANYBLOB="000020000000000024001200140001006272696467655f736c617665000000000c000500080005"], 0x3}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 868.237407][ T1914] RBP: 000000000118d0c0 R08: 0000000000000000 R09: 0000000000000000 [ 868.245378][ T1914] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118d08c [ 868.253350][ T1914] R13: 00007ffd5e589daf R14: 00007f63263b69c0 R15: 000000000118d08c 09:59:43 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') r0 = open(&(0x7f0000001640)='./file0\x00', 0x0, 0x0) readahead(r0, 0x0, 0x0) [ 868.352692][ T28] audit: type=1804 audit(1599386382.387:49): pid=1916 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir305540500/syzkaller.4ClwUQ/592/bus" dev="sda1" ino=16382 res=1 errno=0 09:59:43 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="03000000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x6c, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) [ 868.394602][ T1932] overlayfs: workdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 868.402233][ T1929] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 868.421244][ T1930] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 868.470859][ T1929] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 868.541692][ T28] audit: type=1804 audit(1599386383.127:50): pid=1916 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir305540500/syzkaller.4ClwUQ/592/bus" dev="sda1" ino=16382 res=1 errno=0 [ 868.605804][ T1948] overlayfs: './file0' not a directory [ 868.629264][ T28] audit: type=1804 audit(1599386383.137:51): pid=1920 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir305540500/syzkaller.4ClwUQ/592/bus" dev="sda1" ino=16382 res=1 errno=0 [ 868.657145][ T1929] ieee80211 phy549: Selected rate control algorithm 'minstrel_ht' [ 868.730382][ T28] audit: type=1800 audit(1599386383.137:52): pid=1916 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16382 res=0 errno=0 [ 868.832594][ T28] audit: type=1804 audit(1599386383.147:53): pid=1920 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir305540500/syzkaller.4ClwUQ/592/bus" dev="sda1" ino=16382 res=1 errno=0 09:59:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016400a0702000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:43 executing program 3: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = io_uring_setup(0x5d2, &(0x7f0000000a40)) fcntl$setstatus(r1, 0x4, 0x3400) close_range(r0, 0xffffffffffffffff, 0x0) [ 868.903283][ T28] audit: type=1804 audit(1599386383.147:54): pid=1920 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir305540500/syzkaller.4ClwUQ/592/bus" dev="sda1" ino=16382 res=1 errno=0 [ 869.017047][ T1965] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 869.020273][ T28] audit: type=1804 audit(1599386383.157:55): pid=1927 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir305540500/syzkaller.4ClwUQ/592/bus" dev="sda1" ino=16382 res=1 errno=0 [ 869.057317][ T1965] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 869.133091][ T28] audit: type=1804 audit(1599386383.357:56): pid=1940 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir355577601/syzkaller.kt0WXf/975/file0/file0" dev="overlay" ino=16373 res=1 errno=0 [ 869.208568][ T28] audit: type=1804 audit(1599386383.548:57): pid=1949 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir305540500/syzkaller.4ClwUQ/593/bus/bus/file0" dev="overlay" ino=16352 res=1 errno=0 [ 869.223967][ T1965] ieee80211 phy550: Selected rate control algorithm 'minstrel_ht' 09:59:44 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="04"], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 09:59:44 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') read$FUSE(r1, &(0x7f0000000100)={0x2020}, 0x2020) sendfile(r0, r1, 0x0, 0x800000bf) 09:59:44 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) connect(r0, &(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) 09:59:44 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @dev, 'erspan0\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r0, 0x80047437, 0x0) 09:59:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x5, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x170]}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[], 0x3c}}, 0x0) [ 869.678938][ T1914] ima: Unable to reopen file for reading. 09:59:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x5, 0x5, 0xe001}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48) 09:59:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)={0x1c, 0x1, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) 09:59:44 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) signalfd4(r1, &(0x7f0000000040), 0x8, 0x0) [ 869.885463][ T1999] Module has invalid ELF header [ 869.890406][ T1985] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:59:44 executing program 0: timer_create(0x1d0f5274ded748d9, 0x0, &(0x7f0000000080)) 09:59:44 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="04"], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 869.939215][ T1985] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 869.975029][ T1985] ieee80211 phy551: Selected rate control algorithm 'minstrel_ht' [ 870.090480][ T2015] Module has invalid ELF header 09:59:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016400a0802000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:45 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="04"], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 09:59:45 executing program 0: timer_create(0x1d0f5274ded748d9, 0x0, &(0x7f0000000080)) 09:59:45 executing program 5: mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) 09:59:45 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x71, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 09:59:45 executing program 0: timer_create(0x1d0f5274ded748d9, 0x0, &(0x7f0000000080)) [ 870.284516][ T2031] Module has invalid ELF header [ 870.295723][ T2033] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:59:45 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="04"], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 09:59:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88}, {}, {}, 0x0, 0x6e6bbb, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, 0xe8) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ftruncate(r3, 0x208200) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) [ 870.347439][ T2033] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:45 executing program 0: timer_create(0x1d0f5274ded748d9, 0x0, &(0x7f0000000080)) [ 870.469716][ T2039] Module has invalid ELF header [ 870.642224][ T2033] ieee80211 phy552: Selected rate control algorithm 'minstrel_ht' 09:59:45 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r3 = socket(0x2, 0x5, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 09:59:45 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="04"], 0x2, 0x0) finit_module(r1, 0x0, 0x0) 09:59:45 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000080)) [ 871.118203][ T2068] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 871.130377][ T2068] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 871.195662][ T2068] ieee80211 phy553: Selected rate control algorithm 'minstrel_ht' 09:59:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016400a0902000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:46 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000080)) 09:59:46 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="04"], 0x2, 0x0) finit_module(r1, 0x0, 0x0) [ 871.509712][ T2093] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 871.535437][ T2093] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 871.658489][ T2093] ieee80211 phy554: Selected rate control algorithm 'minstrel_ht' 09:59:46 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) socket(0x200000000000011, 0x2, 0x0) r0 = socket(0x200000000000011, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) sendmmsg(r0, &(0x7f0000004f00)=[{{&(0x7f0000000400)=@xdp={0x2c, 0x8, r3}, 0x80, 0x0}}], 0x1, 0x0) 09:59:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3af057682a9c6716e08d1364ad54a6c6e898cbb38c310d3cafe0569842f464de7188b00"}, 0x60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$nfc_llcp(r1, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cd2) 09:59:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88}, {}, {}, 0x0, 0x6e6bbb, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, 0xe8) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ftruncate(r3, 0x208200) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) 09:59:46 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000080)) 09:59:46 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="04"], 0x2, 0x0) finit_module(r1, 0x0, 0x0) 09:59:46 executing program 0: timer_create(0x1d0f5274ded748d9, 0x0, 0x0) 09:59:47 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 09:59:47 executing program 0: timer_create(0x1d0f5274ded748d9, 0x0, 0x0) 09:59:47 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) close_range(r0, 0xffffffffffffffff, 0x2) [ 872.599428][ T2132] Module has invalid ELF header [ 872.681627][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 872.681641][ T28] audit: type=1804 audit(1599386387.448:66): pid=2132 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir355577601/syzkaller.kt0WXf/983/bus" dev="sda1" ino=16131 res=1 errno=0 [ 872.745795][ T2121] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 872.772983][ T2121] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 872.876106][ T2121] ieee80211 phy555: Selected rate control algorithm 'minstrel_ht' 09:59:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016400a0a02000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:47 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f0000000000)) 09:59:47 executing program 0: timer_create(0x1d0f5274ded748d9, 0x0, 0x0) 09:59:47 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 09:59:47 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10f, 0x10f, 0x8, [@datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "cb"}, @union, @typedef, @enum={0x0, 0xb, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], '#'}, @typedef, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "01"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 09:59:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88}, {}, {}, 0x0, 0x6e6bbb, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, 0xe8) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ftruncate(r3, 0x208200) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) 09:59:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, 0xfffffffffffffffd, 0x0) [ 873.054456][ T28] audit: type=1804 audit(1599386387.918:67): pid=2160 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir355577601/syzkaller.kt0WXf/984/bus" dev="sda1" ino=16131 res=1 errno=0 09:59:48 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0) r1 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x0, 0x0) dup3(r1, r0, 0x0) [ 873.114023][ T2160] Module has invalid ELF header [ 873.151695][ T2170] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:59:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000001c0)=0xfffffffffffffffd) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) 09:59:48 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 873.405033][ T2170] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "02000200000006b5b6c943044900cd9400"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000140)=0x80000004) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x1) [ 873.559993][ T28] audit: type=1804 audit(1599386388.418:68): pid=2183 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir355577601/syzkaller.kt0WXf/985/bus" dev="sda1" ino=15938 res=1 errno=0 [ 873.598611][ T2183] Module has invalid ELF header 09:59:48 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="04"], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 873.725850][ T2170] ieee80211 phy556: Selected rate control algorithm 'minstrel_ht' [ 873.949427][ T28] audit: type=1804 audit(1599386388.808:69): pid=2193 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir355577601/syzkaller.kt0WXf/986/bus" dev="sda1" ino=15938 res=1 errno=0 [ 874.139457][ T2192] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 874.150617][ T2192] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 874.173726][ T2192] ieee80211 phy557: Selected rate control algorithm 'minstrel_ht' 09:59:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016400a0b02000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:49 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88}, {}, {}, 0x0, 0x6e6bbb, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, 0xe8) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ftruncate(r3, 0x208200) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) 09:59:49 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x3000009, 0x10032, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = dup2(r4, r3) dup3(r5, r2, 0x0) 09:59:49 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="04"], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 874.356104][ T28] audit: type=1804 audit(1599386389.218:70): pid=2217 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir355577601/syzkaller.kt0WXf/987/bus" dev="sda1" ino=16338 res=1 errno=0 [ 874.420506][ T2221] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 874.428781][ T2221] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 874.633767][ T2221] ieee80211 phy558: Selected rate control algorithm 'minstrel_ht' [ 875.304020][ T2232] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 875.315795][ T2232] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 875.370149][ T2232] ieee80211 phy559: Selected rate control algorithm 'minstrel_ht' 09:59:50 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="48000000140081fb7059ae08060c04000aff0f03000004000011000000006fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f", 0x48}], 0x1}, 0x0) 09:59:50 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="04"], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 09:59:50 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000000)) 09:59:50 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "02000200000006b5b6c943044900cd9400"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000140)=0x80000004) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x1) 09:59:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88}, {}, {}, 0x0, 0x6e6bbb, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, 0xe8) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ftruncate(r3, 0x208200) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) 09:59:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016400a0c02000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x9}, @IFLA_BOND_UPDELAY={0x8, 0x5, 0x20000000}]}}}]}, 0x44}}, 0x0) 09:59:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x51}}) [ 876.096572][ T2259] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 876.118020][ T28] audit: type=1804 audit(1599386390.978:71): pid=2261 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir355577601/syzkaller.kt0WXf/988/bus" dev="sda1" ino=16372 res=1 errno=0 09:59:51 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="04"], 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) [ 876.159394][ T2268] (unnamed net_device) (uninitialized): down delay (536870912) is not a multiple of miimon (9), value rounded to 536870907 ms [ 876.175282][ T2259] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. 09:59:51 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="04"], 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) 09:59:51 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x0, 0x1}, 0x20) 09:59:51 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0xab04c3, 0x0) 09:59:51 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x0, 0x1}, 0x20) [ 876.553374][ T2259] ieee80211 phy560: Selected rate control algorithm 'minstrel_ht' 09:59:51 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f00000001c0)={0x0, 0xfffffffe, 0x0, 0x18, 0x0, 0xa42}) 09:59:51 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="04"], 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) 09:59:51 executing program 5: add_key(&(0x7f0000000140)='rxrpc\x00', 0x0, &(0x7f00000001c0)='%', 0x1, 0xfffffffffffffffe) 09:59:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "02000200000006b5b6c943044900cd9400"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000140)=0x80000004) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x1) [ 877.032526][ T2332] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 877.045824][ T2332] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'. [ 877.104474][ T2332] ieee80211 phy561: Selected rate control algorithm 'minstrel_ht' 09:59:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016400a0d02000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 09:59:52 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x0, 0x1}, 0x20) 09:59:52 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="04"], 0x2, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) 09:59:52 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88}, {}, {}, 0x0, 0x6e6bbb, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, 0xe8) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ftruncate(r3, 0x208200) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) 09:59:52 executing program 5: clone(0x2000a1047fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="d00800002400ffffff7f0a000410ffffa6fffff7", @ANYRES32=r2, @ANYBLOB="0000000bf1ffffff0000000b080001"], 0x8d0}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 09:59:52 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="04"], 0x2, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) [ 877.293861][ T2360] netlink: 2212 bytes leftover after parsing attributes in process `syz-executor.5'. 09:59:52 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x0, 0x1}, 0x20) [ 877.349278][ T2369] netlink: 2212 bytes leftover after parsing attributes in process `syz-executor.5'. [ 877.357934][ T2367] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:59:52 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="04"], 0x2, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) 09:59:52 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0x802c550a, 0x0) [ 877.528596][ T2367] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.1'.