ile0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3311.985908][T17383] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
[ 3312.006354][T17383] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:41 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400010ff050005002401", 0x2e}], 0x1}, 0x0)

12:17:41 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x0)

[ 3312.141196][T17391] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3312.172300][T17391] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
[ 3312.230874][T17391] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:17:42 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3312.353605][T17398] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
12:17:42 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,sma', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3312.419350][T17391] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3312.439261][T17391] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
[ 3312.449075][T17398] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3312.459931][T17391] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3312.498824][T17401] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
12:17:42 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400048ff050005002401", 0x2e}], 0x1}, 0x0)

12:17:42 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:42 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0)

12:17:42 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137155a370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3312.810589][T17412] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
12:17:42 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:42 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=b', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3312.862005][T17412] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:42 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x3}, 0x0)

12:17:42 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d0040004cff050005002401", 0x2e}], 0x1}, 0x0)

12:17:42 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:42 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137155b370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3313.327544][ T2457] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge)
[ 3313.383850][T17431] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:43 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x4}, 0x0)

12:17:43 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:43 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=b', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:43 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137156b370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:17:43 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400060ff050005002401", 0x2e}], 0x1}, 0x0)

12:17:43 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:43 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x5}, 0x0)

[ 3313.880970][T17446] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3313.904502][T17450] __nla_validate_parse: 4 callbacks suppressed
[ 3313.904539][T17450] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:17:43 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x6}, 0x0)

[ 3314.052348][T17450] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:17:43 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:43 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400068ff050005002401", 0x2e}], 0x1}, 0x0)

12:17:43 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=b', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:44 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e0a0248038047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:17:44 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3314.258006][T17461] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:44 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x7}, 0x0)

12:17:44 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d0040006cff050005002401", 0x2e}], 0x1}, 0x0)

[ 3314.460108][T17469] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:17:44 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fo', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3314.640405][T17469] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:17:44 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x8}, 0x0)

[ 3314.682655][T17477] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:44 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:44 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400074ff050005002401", 0x2e}], 0x1}, 0x0)

12:17:44 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x9}, 0x0)

12:17:44 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e5a0248038047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:17:44 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(0x0, 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3314.989383][T17487] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:45 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xa}, 0x0)

12:17:45 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d0040007aff050005002401", 0x2e}], 0x1}, 0x0)

12:17:45 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3315.310933][T17493] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:17:45 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fo', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3315.453456][T17493] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3315.492294][T17499] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:45 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(0x0, 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:45 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xc}, 0x0)

12:17:45 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff020005002401", 0x2e}], 0x1}, 0x0)

12:17:45 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e5b0248038047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:17:45 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(0x0, 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3315.901531][T17513] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:45 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xe}, 0x0)

12:17:45 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fo', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3316.031123][T17516] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:17:45 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff030005002401", 0x2e}], 0x1}, 0x0)

[ 3316.200676][T17522] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:17:46 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(0x0, 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:46 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0)

12:17:46 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(0x0, 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3316.352993][T17525] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:46 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e6b0248038047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:17:46 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff040005002401", 0x2e}], 0x1}, 0x0)

12:17:46 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x48}, 0x0)

12:17:46 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(0x0, 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:46 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowne', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3316.815685][T17537] validate_nla: 44 callbacks suppressed
[ 3316.815753][T17537] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3316.840450][T17540] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
[ 3316.930228][T17542] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
[ 3316.941512][T17537] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
[ 3316.967907][T17542] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3316.978272][T17537] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:17:46 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x4c}, 0x0)

12:17:46 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:46 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff060005002401", 0x2e}], 0x1}, 0x0)

[ 3317.144200][T17537] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3317.180759][T17537] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
[ 3317.199384][T17537] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3317.237485][T17551] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
12:17:47 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, 0x0, &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3317.369443][T17555] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
12:17:47 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x60}, 0x0)

12:17:47 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowne', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:47 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370300038047000000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3317.462149][T17555] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3317.631212][T17562] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
12:17:47 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:47 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff070005002401", 0x2e}], 0x1}, 0x0)

12:17:47 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x68}, 0x0)

[ 3317.759155][T17564] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
12:17:47 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x6c}, 0x0)

12:17:47 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, 0x0, &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3317.919375][T17570] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:48 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff090005002401", 0x2e}], 0x1}, 0x0)

12:17:48 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x74}, 0x0)

12:17:48 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370348038047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:17:48 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowne', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:48 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3318.373718][T17584] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:48 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x7a}, 0x0)

12:17:48 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff250005002401", 0x2e}], 0x1}, 0x0)

12:17:48 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370a48038047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:17:48 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, 0x0, &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:48 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:48 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xf0}, 0x0)

[ 3318.820932][T17596] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:48 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(0x0, 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3318.967175][T17599] __nla_validate_parse: 5 callbacks suppressed
[ 3318.967231][T17599] netlink: 43028 bytes leftover after parsing attributes in process `syz-executor.2'.
12:17:48 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff5d0005002401", 0x2e}], 0x1}, 0x0)

12:17:49 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x300}, 0x0)

12:17:49 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e373548038047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:17:49 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3319.372949][T17614] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:49 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:49 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(0x0, 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3319.516907][T17618] netlink: 42984 bytes leftover after parsing attributes in process `syz-executor.2'.
12:17:49 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050003002401", 0x2e}], 0x1}, 0x0)

12:17:49 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x500}, 0x0)

[ 3319.602683][T17618] netlink: 42984 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3319.841527][T17630] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:49 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(0x0, 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:49 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e375a48038047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:17:49 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x600}, 0x0)

12:17:49 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050205002401", 0x2e}], 0x1}, 0x0)

12:17:49 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:49 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3320.154615][T17635] netlink: 42948 bytes leftover after parsing attributes in process `syz-executor.2'.
12:17:50 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x700}, 0x0)

[ 3320.273758][T17635] netlink: 42948 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3320.284847][T17641] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:50 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050305002401", 0x2e}], 0x1}, 0x0)

12:17:50 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e375b48038047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:17:50 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x900}, 0x0)

12:17:50 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3320.665650][T17654] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:50 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:50 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(0x0, 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:50 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050405002401", 0x2e}], 0x1}, 0x0)

[ 3320.782187][T17656] netlink: 42948 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3320.896633][T17656] netlink: 42948 bytes leftover after parsing attributes in process `syz-executor.2'.
12:17:50 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e376b48038047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:17:50 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0)

[ 3321.193829][T17673] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:51 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(0x0, 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:51 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:51 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:51 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xc00}, 0x0)

12:17:51 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050505002401", 0x2e}], 0x1}, 0x0)

[ 3321.354606][T17677] netlink: 42932 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3321.536587][T17688] netlink: 42932 bytes leftover after parsing attributes in process `syz-executor.2'.
12:17:51 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(0x0, 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:51 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

12:17:51 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3321.696599][T17693] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:51 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3720f0038047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:17:51 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050605002401", 0x2e}], 0x1}, 0x0)

12:17:51 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:51 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:51 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x2483}, 0x0)

[ 3321.943261][T17702] validate_nla: 47 callbacks suppressed
[ 3321.943313][T17702] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3321.997471][T17702] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
[ 3322.044271][T17706] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
[ 3322.087351][T17706] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3322.232033][T17713] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
[ 3322.271738][T17702] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3322.332640][T17702] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
12:17:52 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:52 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x4800}, 0x0)

12:17:52 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050705002401", 0x2e}], 0x1}, 0x0)

12:17:52 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:52 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370242038047000000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3322.756417][T17723] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
12:17:52 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, 0x0, 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3322.830639][T17726] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
12:17:52 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x4c00}, 0x0)

[ 3322.901408][T17729] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3322.914359][T17726] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3322.928491][T17729] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
[ 3322.995193][T17729] netlink: 44572 bytes leftover after parsing attributes in process `syz-executor.2'.
12:17:52 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, 0x0)
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:53 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050805002401", 0x2e}], 0x1}, 0x0)

12:17:53 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x5865}, 0x0)

12:17:53 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, 0x0, 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:53 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:53 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370243038047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:17:53 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x6000}, 0x0)

[ 3323.460658][T17748] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:53 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050905002401", 0x2e}], 0x1}, 0x0)

12:17:53 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, 0x0)
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:53 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, 0x0, &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:53 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x6558}, 0x0)

12:17:53 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, 0x0, 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:53 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e37025a038047000000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3323.875368][T17759] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:53 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x6800}, 0x0)

12:17:53 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050a05002401", 0x2e}], 0x1}, 0x0)

[ 3324.201365][T17773] __nla_validate_parse: 3 callbacks suppressed
[ 3324.201439][T17773] netlink: 38428 bytes leftover after parsing attributes in process `syz-executor.2'.
12:17:54 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, 0x0)
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:54 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3324.398772][T17777] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3324.408669][T17773] netlink: 38428 bytes leftover after parsing attributes in process `syz-executor.2'.
12:17:54 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, 0x0, &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:54 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050c05002401", 0x2e}], 0x1}, 0x0)

12:17:54 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x6c00}, 0x0)

12:17:54 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e37025b038047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:17:54 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<'])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3324.723061][T17792] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:54 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, 0x0, &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:54 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050e05002401", 0x2e}], 0x1}, 0x0)

12:17:54 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:54 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x7400}, 0x0)

[ 3324.973503][T17797] netlink: 38172 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3325.158094][T17797] netlink: 38172 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3325.168664][T17806] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:55 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<'])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:55 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x7a00}, 0x0)

12:17:55 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050f05002401", 0x2e}], 0x1}, 0x0)

12:17:55 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e37026b038047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:17:55 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:55 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3325.519354][T17815] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:55 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x8100}, 0x0)

[ 3325.707994][T17823] netlink: 34076 bytes leftover after parsing attributes in process `syz-executor.2'.
12:17:55 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff051005002401", 0x2e}], 0x1}, 0x0)

12:17:55 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<'])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3325.910787][T17823] netlink: 34076 bytes leftover after parsing attributes in process `syz-executor.2'.
12:17:55 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:55 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248028047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:17:55 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:55 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x8324}, 0x0)

[ 3326.085555][T17834] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:56 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff054805002401", 0x2e}], 0x1}, 0x0)

12:17:56 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3326.566105][T17854] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:56 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xf000}, 0x0)

12:17:56 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:56 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff054c05002401", 0x2e}], 0x1}, 0x0)

12:17:56 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248048047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:17:56 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:56 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xf0ffff}, 0x0)

[ 3326.865669][T17863] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3327.023868][T17865] validate_nla: 40 callbacks suppressed
[ 3327.023922][T17865] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3327.072027][T17872] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
12:17:56 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:57 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:57 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff056005002401", 0x2e}], 0x1}, 0x0)

12:17:57 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x1000000}, 0x0)

12:17:57 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3327.252602][T17875] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
12:17:57 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248058047000000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3327.388678][T17882] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
[ 3327.453029][T17882] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3327.526946][T17888] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
12:17:57 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:57 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:57 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff056805002401", 0x2e}], 0x1}, 0x0)

12:17:57 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x2000000}, 0x0)

[ 3327.789575][T17895] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3327.841265][T17895] netlink: 'syz-executor.2': attribute type 5 has an invalid length.
[ 3327.889525][T17903] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
[ 3327.926539][T17903] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:57 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3327.976166][T17895] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3327.994145][T17902] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
12:17:57 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:57 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff056c05002401", 0x2e}], 0x1}, 0x0)

12:17:57 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x3000000}, 0x0)

12:17:58 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:58 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248068047000000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3328.297718][T17913] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:58 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x4000000}, 0x0)

12:17:58 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff057405002401", 0x2e}], 0x1}, 0x0)

12:17:58 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3328.611282][T17921] netlink: 'syz-executor.2': attribute type 11 has an invalid length.
[ 3328.640477][T17921] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:17:58 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3328.760942][T17929] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3328.777234][T17921] netlink: 'syz-executor.2': attribute type 11 has an invalid length.
12:17:58 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x5000000}, 0x0)

12:17:58 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3328.832387][T17921] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:17:58 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff057a05002401", 0x2e}], 0x1}, 0x0)

12:17:58 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:58 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248078047000000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3329.124877][T17941] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:59 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x6000000}, 0x0)

12:17:59 executing program 4:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, 0x0)
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:59 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050006002401", 0x2e}], 0x1}, 0x0)

12:17:59 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:59 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248088047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:17:59 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x0)

12:17:59 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3329.642836][T17959] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:17:59 executing program 4:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, 0x0)
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:59 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050007002401", 0x2e}], 0x1}, 0x0)

12:17:59 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x8000000}, 0x0)

12:17:59 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fs', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:17:59 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248098047000000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3330.090998][T17974] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:00 executing program 4:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, 0x0)
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:00 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x9000000}, 0x0)

12:18:00 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050009002401", 0x2e}], 0x1}, 0x0)

12:18:00 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3330.392048][T17982] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3330.521751][T17991] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:00 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xa000000}, 0x0)

12:18:00 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050020002401", 0x2e}], 0x1}, 0x0)

12:18:00 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:00 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fs', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:00 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xc000000}, 0x0)

[ 3330.815172][T17998] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:00 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702480a8047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:00 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050025002401", 0x2e}], 0x1}, 0x0)

12:18:00 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:01 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:01 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xe000000}, 0x0)

[ 3331.239672][T18013] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:01 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fs', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:01 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff05005d002401", 0x2e}], 0x1}, 0x0)

12:18:01 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702480b8047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:01 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x10000000}, 0x0)

12:18:01 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:01 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3331.809541][T18031] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:01 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:01 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050002002401", 0x2e}], 0x1}, 0x0)

12:18:02 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x48000000}, 0x0)

12:18:02 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248108047000000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3332.346081][ T3265] ieee802154 phy0 wpan0: encryption failed: -22
[ 3332.352495][ T3265] ieee802154 phy1 wpan1: encryption failed: -22
12:18:02 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3332.469595][T18050] validate_nla: 36 callbacks suppressed
[ 3332.469612][T18050] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
[ 3332.528235][T18052] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
12:18:02 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:02 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x4c000000}, 0x0)

[ 3332.586656][T18053] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3332.601590][T18052] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3332.637466][T18053] netlink: 'syz-executor.2': attribute type 16 has an invalid length.
12:18:02 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3332.678021][T18053] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:02 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050003002401", 0x2e}], 0x1}, 0x0)

[ 3332.814553][T18059] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
[ 3332.870670][T18053] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3332.897938][T18061] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
[ 3332.916307][T18053] netlink: 'syz-executor.2': attribute type 16 has an invalid length.
[ 3332.948000][T18053] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:02 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:02 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:02 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x60000000}, 0x0)

[ 3333.071529][T18068] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
[ 3333.118582][T18068] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:02 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248118047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:03 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3333.226979][T18073] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
12:18:03 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050004002401", 0x2e}], 0x1}, 0x0)

12:18:03 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x65580000}, 0x0)

12:18:03 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3333.442962][T18080] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3333.592397][T18080] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:03 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:03 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x68000000}, 0x0)

12:18:03 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050006002401", 0x2e}], 0x1}, 0x0)

12:18:03 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248358047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:04 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:04 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,sma', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:04 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x6c000000}, 0x0)

12:18:04 executing program 4:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3334.336893][T18102] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:04 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050007002401", 0x2e}], 0x1}, 0x0)

[ 3334.446474][T18104] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3334.583365][T18104] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:04 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x74000000}, 0x0)

12:18:04 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,sma', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:04 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3334.849887][T18121] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:04 executing program 4:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:04 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702485a8047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:04 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050009002401", 0x2e}], 0x1}, 0x0)

12:18:04 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x7a000000}, 0x0)

[ 3335.172090][T18134] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:05 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,sma', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3335.258456][T18134] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3335.283473][T18138] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:05 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x81000000}, 0x0)

12:18:05 executing program 4:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:05 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:05 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050025002401", 0x2e}], 0x1}, 0x0)

12:18:05 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702485b8047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:05 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x83240000}, 0x0)

12:18:05 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=b', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3335.857250][T18155] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3335.869789][T18153] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:05 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff05005d002401", 0x2e}], 0x1}, 0x0)

12:18:05 executing program 4:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:05 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff}, 0x0)

12:18:05 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3336.013771][T18162] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3336.126064][T18166] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:06 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702486b8047000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:06 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005022401", 0x2e}], 0x1}, 0x0)

12:18:06 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x9effffff}, 0x0)

12:18:06 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=b', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:06 executing program 4:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:06 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3336.692712][T18179] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3336.705879][T18182] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3336.889252][T18191] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:06 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0)

12:18:06 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005032401", 0x2e}], 0x1}, 0x0)

[ 3336.983557][ T2457] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge)
12:18:06 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:06 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e37024803800c000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:07 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=b', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3337.292519][T18200] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:07 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xffffa888}, 0x0)

[ 3337.341060][T18203] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:07 executing program 4:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:07 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005042401", 0x2e}], 0x1}, 0x0)

[ 3337.538248][T18203] validate_nla: 33 callbacks suppressed
[ 3337.538302][T18203] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3337.843189][T18203] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
[ 3337.915867][T18203] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:07 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:07 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xfffff000}, 0x0)

12:18:07 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038035000000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3338.075296][T18217] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
12:18:07 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fo', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3338.151284][T18217] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3338.205618][T18218] EXT4-fs (sda1): Unrecognized mount option "mode=00000000000000000000006" or missing value
[ 3338.245585][T18222] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
12:18:08 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005052401", 0x2e}], 0x1}, 0x0)

12:18:08 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3338.371011][T18225] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
12:18:08 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x0)

[ 3338.457056][T18225] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
12:18:08 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed45"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3338.525187][T18225] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3338.550962][T18232] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
[ 3338.590183][T18232] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:08 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fo', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3338.633790][T18235] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
[ 3338.706700][T18225] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3338.741498][T18225] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
12:18:08 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005062401", 0x2e}], 0x1}, 0x0)

[ 3338.783704][T18225] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:08 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xffffff9e}, 0x0)

12:18:08 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:08 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed45"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:08 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038046000000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3339.092186][T18247] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:08 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005072401", 0x2e}], 0x1}, 0x0)

12:18:09 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fo', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:09 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xfffffff0}, 0x0)

[ 3339.296095][T18255] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3339.350485][T18260] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:09 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed45"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3339.468770][T18255] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:09 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005082401", 0x2e}], 0x1}, 0x0)

12:18:09 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(0x0, 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:09 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0)

12:18:09 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e37024803805a000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:09 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowne', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3339.751708][T18272] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:09 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005092401", 0x2e}], 0x1}, 0x0)

12:18:09 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x2)

12:18:09 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:09 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(0x0, 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:10 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e37024803805b000000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3340.184945][T18285] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:10 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x3)

12:18:10 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500050a2401", 0x2e}], 0x1}, 0x0)

12:18:10 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowne', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:10 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(0x0, 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:10 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:10 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e37024803806b000000d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:10 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x4)

[ 3340.593335][T18299] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:10 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500050c2401", 0x2e}], 0x1}, 0x0)

12:18:10 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047020000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3341.038584][T18319] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:10 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x5)

12:18:10 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3341.129623][T18318] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:10 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:11 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowne', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:11 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500050e2401", 0x2e}], 0x1}, 0x0)

12:18:11 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6)

[ 3341.297437][T18324] __nla_validate_parse: 5 callbacks suppressed
[ 3341.297502][T18324] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3341.685506][T18337] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3341.698162][T18339] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:11 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:11 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:11 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500050f2401", 0x2e}], 0x1}, 0x0)

12:18:11 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x7)

12:18:11 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:11 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047030000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3341.957408][T18346] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3342.139415][T18354] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:12 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x8)

12:18:12 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005102401", 0x2e}], 0x1}, 0x0)

12:18:12 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:12 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:12 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3342.347947][T18354] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:12 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x9)

[ 3342.436815][T18364] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:12 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047040000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3342.879607][T18380] validate_nla: 38 callbacks suppressed
[ 3342.879674][T18380] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3342.919124][T18380] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
[ 3342.935372][T18385] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
[ 3342.973902][T18380] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3343.004415][T18385] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3343.105510][T18393] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
12:18:12 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005482401", 0x2e}], 0x1}, 0x0)

12:18:12 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(0x0, 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:12 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:12 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xa)

12:18:12 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3343.216456][T18380] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
12:18:13 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500054c2401", 0x2e}], 0x1}, 0x0)

[ 3343.418631][T18380] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
[ 3343.430879][T18380] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:13 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047050000d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:13 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xc)

12:18:13 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(0x0, 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3343.583884][T18400] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
12:18:13 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(0x0, 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3343.636717][T18400] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3343.649179][T18403] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3343.704745][T18405] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
[ 3343.715796][T18403] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
12:18:13 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005602401", 0x2e}], 0x1}, 0x0)

[ 3343.813835][T18403] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:13 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xe)

12:18:13 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b951499"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:13 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(0x0, 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3344.023615][T18403] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:13 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047060000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3344.114025][T18411] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:13 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(0x0, 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:14 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x10)

12:18:14 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005682401", 0x2e}], 0x1}, 0x0)

[ 3344.436145][T18422] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3344.488250][ T2457] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge)
12:18:14 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:14 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x48)

12:18:14 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(0x0, 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3344.642423][T18429] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:14 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b951499"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:14 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500056c2401", 0x2e}], 0x1}, 0x0)

[ 3344.686721][T18430] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:14 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x4c)

12:18:14 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047070000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3345.022304][T18445] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:14 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:14 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b951499"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:14 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:15 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005742401", 0x2e}], 0x1}, 0x0)

12:18:15 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x60)

12:18:15 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047080000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3345.564423][T18460] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:15 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:15 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500057a2401", 0x2e}], 0x1}, 0x0)

12:18:15 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x68)

12:18:15 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:15 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:15 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047090000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3346.061207][T18478] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:16 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6c)

12:18:16 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:16 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x74)

12:18:16 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002501", 0x2e}], 0x1}, 0x0)

12:18:16 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3346.671496][T18488] __nla_validate_parse: 4 callbacks suppressed
[ 3346.671556][T18488] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:16 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, 0x0, 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:16 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x7a)

[ 3346.829873][T18499] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3346.842178][T18497] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:17 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005005d01", 0x2e}], 0x1}, 0x0)

12:18:17 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, 0x0, &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:17 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702480380470e0000d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:17 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, 0x0, 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:17 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xf0)

12:18:17 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3347.541573][T18515] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3347.629563][T18516] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:17 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500050df801", 0x2e}], 0x1}, 0x0)

[ 3347.988422][T18516] validate_nla: 37 callbacks suppressed
[ 3347.988445][T18516] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3348.004085][T18516] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
[ 3348.012173][T18516] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:17 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, 0x0, &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3348.167226][T18531] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
12:18:18 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x300)

[ 3348.280143][T18531] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:18 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, 0x0, 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:18 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd092230"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:18 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x500)

[ 3348.434411][T18535] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
12:18:18 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002501", 0x2e}], 0x1}, 0x0)

12:18:18 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702480380470f0000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3348.647344][T18543] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
[ 3348.831636][T18549] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
[ 3348.840782][T18549] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:18 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x600)

[ 3348.925635][T18548] EXT4-fs (sda1): Unrecognized mount option "mode=00000000000000000000006" or missing value
12:18:18 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, 0x0, &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:18 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd092230"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:18 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005005d01", 0x2e}], 0x1}, 0x0)

12:18:18 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3349.007787][T18551] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3349.019164][T18553] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
[ 3349.044220][T18551] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
[ 3349.087106][T18551] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:18 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x700)

[ 3349.173293][T18551] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3349.243570][T18551] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:19 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047480000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3349.421285][T18562] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3349.480676][T18566] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:19 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:19 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd092230"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:19 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005000003", 0x2e}], 0x1}, 0x0)

12:18:19 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3349.658629][T18571] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:19 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x900)

[ 3349.762033][T18571] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:19 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702480380474c0000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3349.891630][T18579] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3349.948248][T18584] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:19 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xa00)

[ 3350.071549][T18586] EXT4-fs (sda1): Unrecognized mount option "mode=00000000000000000000006" or missing value
12:18:19 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:19 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002402", 0x2e}], 0x1}, 0x0)

12:18:19 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:20 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3350.203326][T18592] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:20 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xc00)

[ 3350.299172][T18596] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3350.317360][T18597] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:20 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002403", 0x2e}], 0x1}, 0x0)

12:18:20 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:20 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047600000d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:20 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:20 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xe00)

[ 3350.895285][T18607] EXT4-fs (sda1): Unrecognized mount option "mode=00000000000000000000006" or missing value
[ 3350.913253][T18611] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:20 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002405", 0x2e}], 0x1}, 0x0)

12:18:20 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:21 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x2483)

[ 3351.392598][T18627] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:21 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x4800)

12:18:21 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:21 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002407", 0x2e}], 0x1}, 0x0)

12:18:21 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:21 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047680000d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:21 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3351.903215][T18641] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:22 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002408", 0x2e}], 0x1}, 0x0)

12:18:22 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x0, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3352.300391][T18646] __nla_validate_parse: 2 callbacks suppressed
[ 3352.300467][T18646] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:22 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x4c00)

12:18:22 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3352.615993][T18646] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3352.805944][T18659] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:22 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x5865)

12:18:22 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702480380476c0000d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:22 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:22 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002430", 0x2e}], 0x1}, 0x0)

12:18:23 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:23 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x0, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:23 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6000)

[ 3353.358116][T18671] validate_nla: 33 callbacks suppressed
[ 3353.358136][T18671] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
12:18:23 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3353.418377][T18671] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3353.441164][T18672] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3353.452838][T18675] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
[ 3353.472882][T18672] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
[ 3353.505514][T18672] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:23 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002434", 0x2e}], 0x1}, 0x0)

12:18:23 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6558)

[ 3353.691468][T18684] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
12:18:23 executing program 1:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, 0x0)
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:23 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x0, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3353.744505][T18684] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
[ 3353.782105][T18687] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
[ 3353.817224][T18684] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3353.827117][T18687] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3353.899680][T18691] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
12:18:23 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047740000d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:23 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002444", 0x2e}], 0x1}, 0x0)

12:18:23 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:23 executing program 1:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, 0x0)
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:23 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6800)

[ 3354.172133][T18701] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
[ 3354.214665][T18705] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3354.229886][T18701] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3354.369007][T18705] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:24 executing program 1:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, 0x0)
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:24 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702480380477a0000d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:24 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff05000500245d", 0x2e}], 0x1}, 0x0)

12:18:24 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, 0x0, &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:24 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6c00)

12:18:24 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3354.859205][T18721] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3354.915829][T18726] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:24 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x7400)

[ 3355.060255][T18721] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:24 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002418", 0x2e}], 0x1}, 0x0)

12:18:25 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:25 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047f00000d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:25 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x7a00)

12:18:25 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, 0x0, &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:25 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3355.441428][T18739] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3355.453795][T18745] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:25 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002424", 0x2e}], 0x1}, 0x0)

12:18:25 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x8100)

[ 3355.616624][T18749] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:25 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:25 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000300d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:25 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, 0x0, &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3356.040200][T18759] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3356.090969][T18763] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:26 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x8324)

12:18:26 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:26 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000500d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:26 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002436", 0x2e}], 0x1}, 0x0)

12:18:26 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3356.527172][T18775] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:26 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xf000)

12:18:26 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:26 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002439", 0x2e}], 0x1}, 0x0)

12:18:26 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000600d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:26 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:26 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xf0ffff)

[ 3356.924514][T18789] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:26 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002400", 0x2e}], 0x1}, 0x0)

12:18:26 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:27 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:27 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:27 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x1000000)

12:18:27 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000700d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3357.317017][T18801] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:27 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500050024f2", 0x2e}], 0x1}, 0x0)

[ 3357.501375][T18809] __nla_validate_parse: 5 callbacks suppressed
12:18:27 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3357.587599][T18809] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:27 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x2000000)

12:18:27 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3357.707982][T18809] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3357.796783][T18818] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:27 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:27 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000900d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:28 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x3000000)

12:18:28 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500050024f8", 0x2e}], 0x1}, 0x0)

12:18:28 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3358.505782][T18836] validate_nla: 41 callbacks suppressed
[ 3358.505802][T18836] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
[ 3358.525378][T18837] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
[ 3358.565838][T18837] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3358.565929][T18835] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
12:18:28 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x4000000)

12:18:28 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x0, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3358.897232][T18835] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
[ 3358.989769][T18835] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:28 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500050024f9", 0x2e}], 0x1}, 0x0)

[ 3359.183115][T18844] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
12:18:29 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x5000000)

12:18:29 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:29 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000e00d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3359.594357][T18835] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3359.602995][T18835] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
[ 3359.614301][T18835] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:29 executing program 1:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3359.677467][T18851] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
12:18:29 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x0, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3359.728402][T18851] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3359.763401][T18852] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
12:18:29 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500050024fe", 0x2e}], 0x1}, 0x0)

[ 3359.849144][T18856] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3359.872912][T18856] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:29 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6000000)

[ 3360.177950][T18856] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:30 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:30 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x7000000)

[ 3360.676457][T18871] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:30 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000f00d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:30 executing program 1:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:30 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff05000500241f", 0x2e}], 0x1}, 0x0)

12:18:30 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x0, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3360.943256][T18877] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:30 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x8000000)

12:18:31 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3361.227615][T18882] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3361.232267][T18877] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:31 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0xa}], 0x1}, 0x0)

12:18:31 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047001f00d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:31 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x9000000)

12:18:31 executing program 1:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:31 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, 0x0)
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3361.664235][T18900] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:31 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:31 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0xf}], 0x1}, 0x0)

12:18:31 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xa000000)

[ 3361.815598][T18900] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:31 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, 0x0)
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:31 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xc000000)

12:18:31 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x10}], 0x1}, 0x0)

12:18:32 executing program 1:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:32 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047311f00d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:32 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3362.570419][T18924] __nla_validate_parse: 1 callbacks suppressed
[ 3362.570485][T18924] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:32 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x25}], 0x1}, 0x0)

12:18:32 executing program 1:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:32 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047002000d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:32 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xe000000)

12:18:32 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, 0x0)
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:33 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x30}], 0x1}, 0x0)

12:18:33 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3363.270612][T18945] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:33 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x10000000)

12:18:33 executing program 1:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3363.582688][T18945] validate_nla: 26 callbacks suppressed
[ 3363.582753][T18945] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3363.617846][T18953] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
[ 3363.676580][T18953] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3363.698048][T18945] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
12:18:33 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3363.752319][T18945] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3363.864622][T18960] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
12:18:33 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x5d}], 0x1}, 0x0)

12:18:33 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x48000000)

12:18:33 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:33 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702480380471f3100d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:34 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3364.243974][T18970] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
12:18:34 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3364.294979][T18970] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3364.330456][T18973] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
12:18:34 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0xc0}], 0x1}, 0x0)

[ 3364.405756][T18974] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
12:18:34 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x4c000000)

[ 3364.463958][T18974] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
[ 3364.498979][T18974] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:34 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3364.644173][T18983] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
[ 3364.806975][T18974] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3364.949456][T18983] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3365.001023][T18974] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:34 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:35 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0xec0}], 0x1}, 0x0)

12:18:35 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047003f00d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:35 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x60000000)

12:18:35 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:35 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3365.392410][T18997] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3365.531517][T19003] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:35 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x33fe0}], 0x1}, 0x0)

[ 3365.702769][T19003] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:35 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x65580000)

[ 3365.833110][T19011] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3365.856372][T19008] EXT4-fs (sda1): Unrecognized mount option "mode=00000000000000000000006" or missing value
12:18:35 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047004000d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:35 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:35 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:35 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x200000ee}], 0x1}, 0x0)

12:18:35 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:35 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x68000000)

[ 3366.127208][T19016] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3366.258058][T19016] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:36 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x7ffff000}], 0x1}, 0x0)

12:18:36 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047004800d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:36 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6c000000)

12:18:36 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(0x0, 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:36 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:36 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed45"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3367.028191][T19040] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:36 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0xfffffdef}], 0x1}, 0x0)

12:18:37 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x74000000)

12:18:37 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x2}, 0x0)

12:18:37 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047004c00d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:37 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:37 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed45"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:37 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x7a000000)

12:18:37 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(0x0, 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3367.612729][T19057] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3367.757712][T19065] __nla_validate_parse: 1 callbacks suppressed
[ 3367.757807][T19065] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:37 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x3}, 0x0)

[ 3368.281509][T18107] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge)
12:18:38 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:38 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x81000000)

[ 3368.405150][T19065] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:38 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed45"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:38 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(0x0, 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3368.524076][T19081] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:38 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x5}, 0x0)

12:18:38 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047006000d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3368.876752][T19095] validate_nla: 29 callbacks suppressed
[ 3368.876772][T19095] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
12:18:38 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x83240000)

[ 3369.028505][T19095] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:38 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:38 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x7}, 0x0)

12:18:38 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:38 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3369.125902][T19100] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3369.224158][T19100] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
[ 3369.277935][T19106] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
[ 3369.304465][T19106] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
[ 3369.305491][T19100] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:39 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x88a8ffff)

12:18:39 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x8}, 0x0)

[ 3369.626629][T19118] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
12:18:39 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x9effffff)

12:18:39 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3369.744942][T19118] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
[ 3369.774859][T19118] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:39 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:39 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3369.859018][T19123] netlink: 'syz-executor.3': attribute type 13 has an invalid length.
[ 3369.870098][T19123] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len
12:18:39 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047006800d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:39 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xf0ffffff)

12:18:39 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x30}, 0x0)

[ 3370.473415][T19138] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3370.533354][T19138] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
12:18:40 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:40 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xffffa888)

[ 3370.583034][T19138] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:40 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:40 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3370.690319][T19138] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3370.713264][T19138] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:40 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x34}, 0x0)

12:18:40 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xfffff000)

12:18:40 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047006c00d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:40 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(0x0, 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:41 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:41 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xffffff7f)

12:18:41 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:41 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x44}, 0x0)

[ 3371.261821][T19161] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:41 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xffffff9e)

[ 3371.439803][T19161] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:41 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x5d}, 0x0)

12:18:41 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(0x0, 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:41 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047007400d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:41 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xfffffff0)

12:18:41 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:41 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x118}, 0x0)

12:18:41 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3372.062011][T19185] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:41 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(0x0, 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:42 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x324}, 0x0)

12:18:42 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xf0ffffffffffff)

[ 3372.201925][T19185] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:42 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:42 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047007a00d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:42 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x336}, 0x0)

12:18:42 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:42 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x100000000000000)

12:18:42 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3373.076473][T19211] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:43 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x339}, 0x0)

[ 3373.193449][T19211] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:43 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x200000000000000)

12:18:43 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e37024803804700f000d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:43 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b951499"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:43 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:43 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x500}, 0x0)

[ 3373.795544][T19228] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:43 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x7ffffff2}, 0x0)

12:18:43 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3374.022611][T19228] validate_nla: 17 callbacks suppressed
[ 3374.022675][T19228] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
12:18:43 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x300000000000000)

[ 3374.113119][T19228] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
12:18:43 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x7ffffff8}, 0x0)

12:18:44 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b951499"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3374.190058][T19228] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3374.370570][T19246] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
12:18:44 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000200d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:44 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:44 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x400000000000000)

12:18:44 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:44 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x7ffffff9}, 0x0)

[ 3374.669911][T19254] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3374.716801][T19254] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
12:18:44 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b951499"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3374.768068][T19257] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
[ 3374.782713][T19254] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:44 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x500000000000000)

12:18:44 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x7ffffffe}, 0x0)

[ 3374.991887][T19266] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3375.010794][T19266] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
[ 3375.015089][T19264] EXT4-fs (sda1): Unrecognized mount option "mode=00000000000000000000006" or missing value
[ 3375.027395][T19266] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3375.050102][T19269] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
12:18:44 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x0, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:44 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x600000000000000)

12:18:45 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, 0x0, 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:45 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000300d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:45 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0xffffff1f}, 0x0)

[ 3375.354015][T19279] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
12:18:45 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x700000000000000)

[ 3375.574276][T12099] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge)
12:18:45 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x2}, 0x0)

[ 3375.751667][T19290] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:45 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x0, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:45 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:45 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, 0x0, 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:45 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000400d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:45 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x800000000000000)

12:18:45 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x3}, 0x0)

12:18:46 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x4}, 0x0)

12:18:46 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x900000000000000)

12:18:46 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x0, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3376.507433][T19311] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:46 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, 0x0, 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:46 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3376.637762][T19311] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:46 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x5}, 0x0)

12:18:46 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xa00000000000000)

12:18:47 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xc00000000000000)

12:18:47 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000500d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3377.193710][T19328] EXT4-fs (sda1): Unrecognized mount option "mode=00000000000000000000006" or missing value
12:18:47 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x0, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:47 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:47 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x6}, 0x0)

12:18:47 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:47 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xe00000000000000)

[ 3377.423220][T19338] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:47 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x7}, 0x0)

12:18:47 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x0, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:47 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000600d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:47 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x1000000000000000)

12:18:47 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd092230"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:47 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:47 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x8}, 0x0)

[ 3378.177256][T19360] __nla_validate_parse: 1 callbacks suppressed
[ 3378.177313][T19360] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3378.506802][T19360] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:48 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x4800000000000000)

12:18:48 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x0, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:48 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd092230"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:48 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x9}, 0x0)

12:18:48 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000700d1bd", 0x33fe0}], 0x1}, 0x0)

[ 3379.094746][T19378] validate_nla: 21 callbacks suppressed
[ 3379.094767][T19378] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
12:18:48 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:49 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x4c00000000000000)

12:18:49 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3379.453115][T19392] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
[ 3379.498602][T19393] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3379.519397][T19393] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
12:18:49 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd092230"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:49 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:49 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0xa}, 0x0)

[ 3379.548127][T19393] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:49 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6000000000000000)

[ 3379.680837][T19393] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3379.732205][T19393] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
[ 3379.758514][T19393] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:49 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0xc}, 0x0)

[ 3379.850561][T19406] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
12:18:49 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:49 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000800d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:49 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:49 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6558000000000000)

12:18:49 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3380.149253][T19415] netlink: 'syz-executor.2': attribute type 63 has an invalid length.
[ 3380.232552][T19421] netlink: 'syz-executor.0': attribute type 13 has an invalid length.
[ 3380.251738][T19415] netlink: 'syz-executor.2': attribute type 3 has an invalid length.
12:18:50 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0xe}, 0x0)

12:18:50 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6800000000000000)

[ 3380.332079][T19415] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:50 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:50 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3380.506975][T19415] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:50 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6c00000000000000)

12:18:50 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0xf}, 0x0)

12:18:50 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:50 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000900d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:50 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, 0x0, &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:50 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x7400000000000000)

12:18:50 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x10}, 0x0)

12:18:50 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3381.216304][T19450] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3381.339214][T19450] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:51 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x7a00000000000000)

12:18:51 executing program 1:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:51 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x48}, 0x0)

12:18:51 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000e00d1bd", 0x33fe0}], 0x1}, 0x0)

12:18:51 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
unlink(0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, 0x0, &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

12:18:51 executing program 4:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"])
mkdir(&(0x7f0000000240)='./file0\x00', 0x100)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32])
mkdir(0x0, 0x0)
mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"])
mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x0, 0x0)
mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX])
socketpair(0x38, 0x800, 0x8, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00'])
socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0)
socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0)

[ 3381.694915][T19466] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:51 executing program 3:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x4c}, 0x0)

[ 3381.783176][T19466] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'.
12:18:51 executing program 0:
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$TUNSETLINK(r0, 0x8912, 0x400308)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x8100000000000000)

[ 3487.019656][    C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
[ 3487.026740][    C1] 	(detected by 1, t=10502 jiffies, g=508701, q=36)
[ 3487.034806][    C1] rcu: All QSes seen, last rcu_preempt kthread activity 10502 (4295285870-4295275368), jiffies_till_next_fqs=1, root ->qsmask 0x0
[ 3487.048216][    C1] rcu: rcu_preempt kthread starved for 10502 jiffies! g508701 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
[ 3487.063342][    C1] rcu: 	Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
[ 3487.073522][    C1] rcu: RCU grace-period kthread stack dump:
[ 3487.079439][    C1] task:rcu_preempt     state:R  running task     stack:28032 pid:   14 ppid:     2 flags:0x00004000
[ 3487.090448][    C1] Call Trace:
[ 3487.093747][    C1]  __schedule+0x93a/0x26f0
[ 3487.098200][    C1]  ? io_schedule_timeout+0x140/0x140
[ 3487.103517][    C1]  ? debug_object_destroy+0x210/0x210
[ 3487.109040][    C1]  schedule+0xd3/0x270
[ 3487.113141][    C1]  schedule_timeout+0x14a/0x2a0
[ 3487.118132][    C1]  ? usleep_range+0x170/0x170
[ 3487.122826][    C1]  ? destroy_timer_on_stack+0x20/0x20
[ 3487.128221][    C1]  ? rnbd_clt_map_device.cold+0x764/0x832
[ 3487.133997][    C1]  ? _raw_spin_unlock_irqrestore+0x3d/0x70
[ 3487.139826][    C1]  ? prepare_to_swait_event+0xee/0x470
[ 3487.145324][    C1]  rcu_gp_kthread+0xd34/0x1980
[ 3487.150132][    C1]  ? print_cpu_stall_info+0x6b0/0x6b0
[ 3487.155538][    C1]  ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[ 3487.162060][    C1]  ? __kthread_parkme+0x15f/0x220
[ 3487.167378][    C1]  ? print_cpu_stall_info+0x6b0/0x6b0
[ 3487.172795][    C1]  kthread+0x3e5/0x4d0
[ 3487.176882][    C1]  ? set_kthread_struct+0x130/0x130
[ 3487.182108][    C1]  ret_from_fork+0x1f/0x30
[ 3487.186563][    C1] rcu: Stack dump where RCU GP kthread last ran:
[ 3487.192912][    C1] Sending NMI from CPU 1 to CPUs 0:
[ 3487.199607][    C0] NMI backtrace for cpu 0
[ 3487.199621][    C0] CPU: 0 PID: 19476 Comm: syz-executor.4 Not tainted 5.14.0-rc5-syzkaller #0
[ 3487.199635][    C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3487.199648][    C0] RIP: 0010:unwind_next_frame+0xa/0x1ce0
[ 3487.199663][    C0] Code: e8 db c4 88 00 48 8b 04 24 eb bd 48 89 0c 24 e8 4c c4 88 00 48 8b 0c 24 e9 72 ff ff ff 0f 1f 00 48 b8 00 00 00 00 00 fc ff df <41> 57 41 56 49 89 fe 41 55 41 54 55 53 48 81 ec a0 00 00 00 48 c7
[ 3487.199684][    C0] RSP: 0018:ffffc90000007708 EFLAGS: 00000202
[ 3487.199700][    C0] RAX: dffffc0000000000 RBX: ffffffff816417f0 RCX: 0000000000000000
[ 3487.199712][    C0] RDX: 1ffff92000000f11 RSI: ffffffff81650843 RDI: ffffc90000007710
[ 3487.199724][    C0] RBP: ffffc90000007798 R08: ffffffff8deaa6da R09: 0000000000000001
[ 3487.199737][    C0] R10: fffff52000000eed R11: 0000000000086088 R12: ffffc900000077c8
[ 3487.199749][    C0] R13: 0000000000000000 R14: ffff88801f2dd4c0 R15: 0000000000000a20
[ 3487.199761][    C0] FS:  00007ff18154d700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
[ 3487.199774][    C0] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 3487.199785][    C0] CR2: 00000000005131f0 CR3: 0000000078256000 CR4: 00000000001506f0
[ 3487.199798][    C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 3487.199810][    C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[ 3487.199820][    C0] Call Trace:
[ 3487.199825][    C0]  <IRQ>
[ 3487.199831][    C0]  arch_stack_walk+0x7d/0xe0
[ 3487.199839][    C0]  ? run_timer_softirq+0xb3/0x1d0
[ 3487.199848][    C0]  stack_trace_save+0x8c/0xc0
[ 3487.199856][    C0]  ? stack_trace_consume_entry+0x160/0x160
[ 3487.199864][    C0]  ? mark_lock+0xef/0x17b0
[ 3487.199876][    C0]  kasan_save_stack+0x1b/0x40
[ 3487.199883][    C0]  ? kasan_save_stack+0x1b/0x40
[ 3487.199892][    C0]  ? __kasan_slab_alloc+0x84/0xa0
[ 3487.199900][    C0]  ? kmem_cache_alloc+0x285/0x4a0
[ 3487.199908][    C0]  ? skb_clone+0x170/0x3c0
[ 3487.199916][    C0]  ? hsr_create_tagged_frame+0x173/0xb60
[ 3487.199925][    C0]  ? hsr_forward_skb+0x84c/0x1620
[ 3487.199933][    C0]  ? send_hsr_supervision_frame+0x60b/0x8d0
[ 3487.199942][    C0]  ? hsr_announce+0x109/0x330
[ 3487.199950][    C0]  ? call_timer_fn+0x1a5/0x6b0
[ 3487.199958][    C0]  ? __run_timers.part.0+0x675/0xa20
[ 3487.199967][    C0]  ? run_timer_softirq+0xb3/0x1d0
[ 3487.199976][    C0]  ? tick_program_event+0xb4/0x140
[ 3487.199985][    C0]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 3487.199994][    C0]  ? kvm_sched_clock_read+0x14/0x40
[ 3487.200002][    C0]  ? sched_clock_cpu+0x15/0x1f0
[ 3487.200010][    C0]  ? mark_held_locks+0x9f/0xe0
[ 3487.200018][    C0]  ? irqtime_account_irq+0x187/0x2d0
[ 3487.200027][    C0]  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[ 3487.200037][    C0]  ? lockdep_hardirqs_on+0x79/0x100
[ 3487.200046][    C0]  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[ 3487.200055][    C0]  ? skb_clone+0x153/0x3c0
[ 3487.200062][    C0]  ? kasan_unpoison+0x3c/0x60
[ 3487.200070][    C0]  __kasan_slab_alloc+0x84/0xa0
[ 3487.200079][    C0]  kmem_cache_alloc+0x285/0x4a0
[ 3487.200086][    C0]  skb_clone+0x170/0x3c0
[ 3487.200094][    C0]  hsr_create_tagged_frame+0x173/0xb60
[ 3487.200104][    C0]  ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
[ 3487.200113][    C0]  ? hsr_register_frame_out+0x1da/0x2a0
[ 3487.200121][    C0]  hsr_forward_skb+0x84c/0x1620
[ 3487.200132][    C0]  ? prp_drop_frame+0xa0/0x150
[ 3487.200142][    C0]  ? prp_fill_frame_info+0x6b0/0x6b0
[ 3487.200151][    C0]  ? memset+0x20/0x40
[ 3487.200156][    C0]  ? __skb_pad+0x247/0x5f0
[ 3487.200163][    C0]  send_hsr_supervision_frame+0x60b/0x8d0
[ 3487.200170][    C0]  ? send_hsr_supervision_frame+0x8d0/0x8d0
[ 3487.200177][    C0]  hsr_announce+0x109/0x330
[ 3487.200184][    C0]  ? send_hsr_supervision_frame+0x8d0/0x8d0
[ 3487.200191][    C0]  call_timer_fn+0x1a5/0x6b0
[ 3487.200197][    C0]  ? add_timer_on+0x4a0/0x4a0
[ 3487.200203][    C0]  ? send_hsr_supervision_frame+0x8d0/0x8d0
[ 3487.200211][    C0]  __run_timers.part.0+0x675/0xa20
[ 3487.200217][    C0]  ? call_timer_fn+0x6b0/0x6b0
[ 3487.200224][    C0]  ? lapic_next_event+0x4d/0x80
[ 3487.200230][    C0]  run_timer_softirq+0xb3/0x1d0
[ 3487.200237][    C0]  __do_softirq+0x29b/0x9c2
[ 3487.200243][    C0]  __irq_exit_rcu+0x16e/0x1c0
[ 3487.200249][    C0]  irq_exit_rcu+0x5/0x20
[ 3487.200255][    C0]  sysvec_apic_timer_interrupt+0x93/0xc0
[ 3487.200261][    C0]  </IRQ>
[ 3487.200267][    C0]  asm_sysvec_apic_timer_interrupt+0x12/0x20
[ 3487.200275][    C0] RIP: 0010:do_raw_spin_lock+0x17b/0x2b0
[ 3487.200287][    C0] Code: 0f b6 14 02 4c 89 e0 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 d9 00 00 00 4c 89 ea 44 89 75 08 48 b8 00 00 00 00 00 fc ff df <48> c1 ea 03 65 4c 8b 24 25 00 f0 01 00 80 3c 02 00 0f 85 e4 00 00
[ 3487.200305][    C0] RSP: 0018:ffffc90002e3f9c8 EFLAGS: 00000246
[ 3487.200317][    C0] RAX: dffffc0000000000 RBX: 1ffff920005c7f3a RCX: ffffffff815b9610
[ 3487.200327][    C0] RDX: ffff88801a5677c8 RSI: 0000000000000004 RDI: ffffc90002e3f9f0
[ 3487.200338][    C0] RBP: ffff88801a5677b8 R08: 0000000000000001 R09: 0000000000000003
[ 3487.200348][    C0] R10: fffff520005c7f3e R11: 0000000000000000 R12: ffff88801a5677c0
[ 3487.200358][    C0] R13: ffff88801a5677c8 R14: 0000000000000000 R15: 0000000000000000
[ 3487.200366][    C0]  ? do_raw_spin_lock+0x120/0x2b0
[ 3487.200374][    C0]  ? do_raw_spin_lock+0x120/0x2b0
[ 3487.200380][    C0]  ? rwlock_bug.part.0+0x90/0x90
[ 3487.200387][    C0]  __find_get_block+0x4df/0xdb0
[ 3487.200394][    C0]  find_inode_bit+0x230/0x580
[ 3487.200401][    C0]  __ext4_new_inode+0xc4d/0x5c40
[ 3487.200408][    C0]  ? __dquot_initialize+0x295/0xbe0
[ 3487.200416][    C0]  ? ext4_mark_inode_used+0x1a70/0x1a70
[ 3487.200423][    C0]  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[ 3487.200431][    C0]  ? mark_held_locks+0x9f/0xe0
[ 3487.200438][    C0]  ? ext4_mkdir+0x6c4/0xb20
[ 3487.200444][    C0]  ext4_mkdir+0x33a/0xb20
[ 3487.200452][    C0]  ? security_inode_permission+0xa8/0xf0
[ 3487.200459][    C0]  ? ext4_rmdir+0xf10/0xf10
[ 3487.200466][    C0]  ? security_inode_permission+0xc5/0xf0
[ 3487.200474][    C0]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 3487.200482][    C0]  vfs_mkdir+0x52e/0x760
[ 3487.200489][    C0]  do_mkdirat+0x284/0x310
[ 3487.200495][    C0]  ? user_path_create+0xf0/0xf0
[ 3487.200503][    C0]  ? syscall_enter_from_user_mode+0x21/0x70
[ 3487.200511][    C0]  do_syscall_64+0x35/0xb0
[ 3487.200518][    C0]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3487.200526][    C0] RIP: 0033:0x4665e9
[ 3487.200539][    C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3487.200559][    C0] RSP: 002b:00007ff18154d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
[ 3487.200582][    C0] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9
[ 3487.200592][    C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040
[ 3487.200602][    C0] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000
[ 3487.200613][    C0] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80
[ 3487.200623][    C0] R13: 00007ffe8aaabc8f R14: 00007ff18154d300 R15: 0000000000022000
[ 3487.204059][T19474] 
[ 3487.885826][T19474] ================================
[ 3487.890926][T19474] WARNING: inconsistent lock state
[ 3487.896036][T19474] 5.14.0-rc5-syzkaller #0 Not tainted
[ 3487.901432][T19474] --------------------------------
[ 3487.906541][T19474] inconsistent {IN-HARDIRQ-W} -> {HARDIRQ-ON-W} usage.
[ 3487.913385][T19474] syz-executor.1/19474 [HC0[0]:SC0[0]:HE0:SE1] takes:
[ 3487.920154][T19474] ffffffff8b9850d8 (rcu_node_0){?.-.}-{2:2}, at: rcu_sched_clock_irq+0xc9a/0x20c0
[ 3487.929490][T19474] {IN-HARDIRQ-W} state was registered at:
[ 3487.935211][T19474]   lock_acquire+0x1ab/0x510
[ 3487.939848][T19474]   _raw_spin_lock_irqsave+0x39/0x50
[ 3487.945142][T19474]   rcu_report_exp_cpu_mult+0x1c/0x280
[ 3487.950610][T19474]   flush_smp_call_function_queue+0x34b/0x640
[ 3487.956691][T19474]   __sysvec_call_function_single+0x95/0x3d0
[ 3487.962682][T19474]   sysvec_call_function_single+0x8e/0xc0
[ 3487.968415][T19474]   asm_sysvec_call_function_single+0x12/0x20
[ 3487.974504][T19474]   bad_range+0xcf/0x300
[ 3487.979202][T19474]   get_page_from_freelist+0xa51/0x2f80
[ 3487.984758][T19474]   __alloc_pages+0x1b2/0x500
[ 3487.989452][T19474]   alloc_pages+0x18c/0x2a0
[ 3487.994021][T19474]   allocate_slab+0x32e/0x4b0
[ 3487.998869][T19474]   ___slab_alloc+0x473/0x7b0
[ 3488.003574][T19474]   __slab_alloc.constprop.0+0xa7/0xf0
[ 3488.009297][T19474]   kmem_cache_alloc+0x3e1/0x4a0
[ 3488.014282][T19474]   __alloc_file+0x21/0x280
[ 3488.018908][T19474]   alloc_empty_file+0x6d/0x170
[ 3488.024116][T19474]   path_openat+0xde/0x27f0
[ 3488.028837][T19474]   do_filp_open+0x1aa/0x400
[ 3488.033840][T19474]   do_open_execat+0x116/0x690
[ 3488.038613][T19474]   bprm_execve+0x48c/0x19b0
[ 3488.043210][T19474]   kernel_execve+0x370/0x460
[ 3488.048074][T19474]   call_usermodehelper_exec_async+0x2e3/0x580
[ 3488.054240][T19474]   ret_from_fork+0x1f/0x30
[ 3488.058751][T19474] irq event stamp: 10063736
[ 3488.063242][T19474] hardirqs last  enabled at (10063735): [<ffffffff89400c02>] asm_sysvec_apic_timer_interrupt+0x12/0x20
[ 3488.074284][T19474] hardirqs last disabled at (10063736): [<ffffffff892dc98b>] sysvec_apic_timer_interrupt+0xb/0xc0
[ 3488.085157][T19474] softirqs last  enabled at (15916): [<ffffffff81464b1e>] __irq_exit_rcu+0x16e/0x1c0
[ 3488.094634][T19474] softirqs last disabled at (14155): [<ffffffff81464b1e>] __irq_exit_rcu+0x16e/0x1c0
[ 3488.104106][T19474] 
[ 3488.104106][T19474] other info that might help us debug this:
[ 3488.112568][T19474]  Possible unsafe locking scenario:
[ 3488.112568][T19474] 
[ 3488.120099][T19474]        CPU0
[ 3488.123374][T19474]        ----
[ 3488.126912][T19474]   lock(rcu_node_0);
[ 3488.130909][T19474]   <Interrupt>
[ 3488.134464][T19474]     lock(rcu_node_0);
[ 3488.138974][T19474] 
[ 3488.138974][T19474]  *** DEADLOCK ***
[ 3488.138974][T19474] 
[ 3488.147114][T19474] 4 locks held by syz-executor.1/19474:
[ 3488.152662][T19474]  #0: ffff888147fb8460 (sb_writers#5){.+.+}-{0:0}, at: filename_create+0x104/0x490
[ 3488.162354][T19474]  #1: ffff8880903f3660 (&type->i_mutex_dir_key#4/1){+.+.}-{3:3}, at: filename_create+0x15a/0x490
[ 3488.173098][T19474]  #2: ffff88801a5677d0 (&mapping->private_lock){+.+.}-{2:2}, at: __find_get_block+0x4df/0xdb0
[ 3488.183595][T19474]  #3: ffffffff8b9850d8 (rcu_node_0){?.-.}-{2:2}, at: rcu_sched_clock_irq+0xc9a/0x20c0
[ 3488.193305][T19474] 
[ 3488.193305][T19474] stack backtrace:
[ 3488.199303][T19474] CPU: 1 PID: 19474 Comm: syz-executor.1 Not tainted 5.14.0-rc5-syzkaller #0
[ 3488.208161][T19474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3488.218217][T19474] Call Trace:
[ 3488.221512][T19474]  dump_stack_lvl+0xcd/0x134
[ 3488.226323][T19474]  mark_lock.cold+0x61/0x8e
[ 3488.230848][T19474]  ? lock_chain_count+0x20/0x20
[ 3488.235717][T19474]  ? lock_chain_count+0x20/0x20
[ 3488.241377][T19474]  ? mark_lock+0xef/0x17b0
[ 3488.246257][T19474]  ? mark_lock+0xef/0x17b0
[ 3488.250778][T19474]  ? lock_chain_count+0x20/0x20
[ 3488.255667][T19474]  mark_held_locks+0x9f/0xe0
[ 3488.260274][T19474]  lockdep_hardirqs_on_prepare+0x135/0x400
[ 3488.266182][T19474]  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[ 3488.272349][T19474]  trace_hardirqs_on+0x5b/0x1c0
[ 3488.277242][T19474]  asm_sysvec_apic_timer_interrupt+0x12/0x20
[ 3488.283245][T19474] RIP: 0010:__pv_queued_spin_lock_slowpath+0x3ba/0xb40
[ 3488.290117][T19474] Code: eb c6 45 01 01 41 bc 00 80 00 00 48 c1 e9 03 83 e3 07 41 be 01 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8d 2c 01 eb 0c f3 90 <41> 83 ec 01 0f 84 72 04 00 00 41 0f b6 45 00 38 d8 7f 08 84 c0 0f
[ 3488.309912][T19474] RSP: 0018:ffffc900032ef8f0 EFLAGS: 00000206
[ 3488.315988][T19474] RAX: 0000000000000003 RBX: 0000000000000000 RCX: 1ffff110034acef7
[ 3488.324421][T19474] RDX: 0000000000000001 RSI: ffffffff817bd271 RDI: ffffffff81332591
[ 3488.332405][T19474] RBP: ffff88801a5677b8 R08: 0000000000000001 R09: 0000000000000001
[ 3488.340396][T19474] R10: ffffffff817bd239 R11: 0000000000000000 R12: 0000000000003498
[ 3488.348375][T19474] R13: ffffed10034acef7 R14: 0000000000000001 R15: ffff8880b9d527c0
[ 3488.356440][T19474]  ? trace_hardirqs_on+0x19/0x1c0
[ 3488.361570][T19474]  ? trace_hardirqs_on+0x51/0x1c0
[ 3488.366603][T19474]  ? kvm_wait+0x51/0xf0
[ 3488.370776][T19474]  ? pv_hash+0x100/0x100
[ 3488.375028][T19474]  ? lock_release+0x720/0x720
[ 3488.379712][T19474]  do_raw_spin_lock+0x200/0x2b0
[ 3488.384570][T19474]  ? rwlock_bug.part.0+0x90/0x90
[ 3488.389530][T19474]  __find_get_block+0x4df/0xdb0
[ 3488.394412][T19474]  find_inode_bit+0x230/0x580
[ 3488.399128][T19474]  __ext4_new_inode+0xc4d/0x5c40
[ 3488.404111][T19474]  ? __dquot_initialize+0xe9/0xbe0
[ 3488.409231][T19474]  ? ext4_mark_inode_used+0x1a70/0x1a70
[ 3488.414797][T19474]  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[ 3488.420998][T19474]  ? ext4_mkdir+0xb0/0xb20
[ 3488.425427][T19474]  ? ext4_mkdir+0x6c4/0xb20
[ 3488.429946][T19474]  ext4_mkdir+0x33a/0xb20
[ 3488.434299][T19474]  ? ext4_rmdir+0xf10/0xf10
[ 3488.438813][T19474]  ? bpf_lsm_inode_symlink+0x10/0x10
[ 3488.444141][T19474]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 3488.450398][T19474]  vfs_mkdir+0x52e/0x760
[ 3488.454652][T19474]  do_mkdirat+0x284/0x310
[ 3488.459006][T19474]  ? user_path_create+0xf0/0xf0
[ 3488.463862][T19474]  ? syscall_enter_from_user_mode+0x21/0x70
[ 3488.469797][T19474]  do_syscall_64+0x35/0xb0
[ 3488.474225][T19474]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3488.480132][T19474] RIP: 0033:0x4665e9
[ 3488.484116][T19474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3488.503732][T19474] RSP: 002b:00007fb42b675188 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
[ 3488.512155][T19474] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9
[ 3488.520140][T19474] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040
[ 3488.528206][T19474] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000
[ 3488.536190][T19474] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80
[ 3488.544190][T19474] R13: 00007fffbe33c34f R14: 00007fb42b675300 R15: 0000000000022000